Simulating Execution in Malicious Text Detection
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Explore advanced techniques for malicious text detection in this conference talk from the Hack In The Box Security Conference. Dive into the limitations of static detection methods and the advantages of dynamic detection algorithms. Learn about code obfuscation techniques used by attackers to hinder feature extraction and the importance of simulating execution environments. Discover how dynamic detection can overcome challenges in syntax and lexical constraints, resulting in lower false positive rates. Examine the trade-offs between static and dynamic detection methods, including implementation costs, detection speed, and compatibility issues. Gain insights from experienced security researchers on cloud security, host security, and malicious text detection. Understand the complexities of developing text-based sandboxes for detecting webshells and malicious scripts. Explore emerging challenges in sandbox solutions, such as branch, time, and network confrontations.
Syllabus
#HITB2022SIN #COMMSEC Simulating Execution In Malicious Text Detection - S. Wang & Y Sun
Taught by
Hack In The Box Security Conference
Related Courses
Computer Vision: The FundamentalsUniversity of California, Berkeley via Coursera Einführung in Computer Vision
Technische Universität München (Technical University of Munich) via Coursera 機器學習技法 (Machine Learning Techniques)
National Taiwan University via Coursera Machine Learning for Musicians and Artists
Goldsmiths University of London via Kadenze Прикладные задачи анализа данных
Moscow Institute of Physics and Technology via Coursera