Techniques, Tools, and Research Issues

Slides:



Advertisements
Similar presentations
Dean Carlson and Beth Anne Byrd CpSc 420.  What is reverse engineering?  Brief History  Usefulness  The process  Bagle Virus example.
Advertisements

Dynamic Software Updating Michael Hicks Jonathan T. Moore Scott Nettles Presented by Arun Joseph.
GridScape Ding Choon Hoong Grid Computing and Distributed Systems (GRIDS) Lab. The University of Melbourne Melbourne, Australia WW Grid.
Disclaimer The Content, Demonstration, Source Code and Programs presented here is "AS IS" without any warranty or conditions.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Binary Auditing Geller Bedoya Michael Wozniak. Background  Binary auditing is a technique used to test the security and discover the inner workings of.
Crossing The Line: Distributed Computing Across Network and Filesystem Boundaries.
Monnappa KA  Info Security Cisco  Member of SecurityXploded  Reverse Engineering, Malware Analysis, Memory Forensics 
DBPD: A Dynamic Birthmark-based Software Plagiarism Detection Tool
Jump to first page (c) 1999, A. Lakhotia 1 Software engineering? Arun Lakhotia University of Louisiana at Lafayette Po Box Lafayette, LA 70504, USA.
EECS 354 Network Security Reverse Engineering. Introduction Preventing Reverse Engineering Reversing High Level Languages Reversing an ELF Executable.
Malware Analysis Jaimin Shah & Krunal Patel Vishal Patel & Shreyas Patel Georgia Institute of Technology School of Electrical and Computer Engineering.
Malware Dynamic Analysis Veronica Kovah vkovah.ost at gmail See notes for citation1
HELP COMPONEN SYSTEM WinCC CERN SUBJECTS - GENERATE HTML COMPONENT FILES - FULL COMPONENTS FRAMEWORK HELP - CENTRAL HELP REPOSITORY - ACCESIBLE.
ApacheJMeter Lecture notes by Theodoros Anagnostopoulos.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
ECHO A System Monitoring and Management Tool Yitao Duan and Dawey Huang.
Physics and Engineering. Calculus I - Physics I (MAC 2311-PHY 2048)  Success rate*  UCF %  FCS %  Points of Emphasis  Alignment with.
Advanced Network Labs & Remote Network Agent
COMM 470 Week 5 Learning Team Social Media Tools in Ecommerce ​ Check this A+ tutorial guideline at Week-5-Learning-Team-Social-Media-Tools-in-Ecommerce.
Introduction to Barracuda IM Firewall
Building Enterprise Applications Using Visual Studio®
CHAPTER 4 Methodology.
Rick Graziani Cabrillo College
By: Samuel Oswald Hunter Supervisor: Mr Barry Irwin
Domain Name Service (DNS) Network Registry
CSC207 Fall 2016.
Malware Reverse Engineering Process
Introduction Copyright © 2007 Ramez Elmasri and Shamkant B. Navathe.
Techniques, Tools, and Research Issues
Techniques, Tools, and Research Issues
Techniques, Tools, and Research Issues
Chapter 7: Introduction to Data Communications and Networking
Docker Birthday #3.
6 Network Layer Part III Computer Networks Tutun Juhana
Techniques, Tools, and Research Issues
Computer Aided Software Engineering (CASE)
Lab experience teaching System Software
Malware Reverse Engineering Process
Pertemuan 11 Virtual LANs
Hacking Lab Challenges
Techniques, Tools, and Research Issues
Part 1: Basic Analysis Chapter 1: Basic Static Techniques
CIT 249 Possible Is Everything/tutorialrank.com
CIT 249Competitive Success/snaptutorial.com
CIT 249 Education for Service/tutorialrank.com
CIT 249 Education for Service-- snaptutorial.com
CIT 249 Teaching Effectively-- snaptutorial.com
Introduction An introduction to the software and organization of the Internet Lab.
Introduction to Entrepreneurship
The Extensible Tool-chain for Evaluation of Architectural Models
Chapter 3. Basic Dynamic Analysis
“just-in-time” compilation (JIT) technique prepared by - Harshada Hole
Network Models, Hardware, Protocols and number systems
1 مفهوم ارتباطات ارتباطات معادل واژه communications ) ميباشد(. ارتباطات يك فرايند اجتماعي و دو طرفه است كه در آن اطلاعات مبادله شده و نوعي تفاهم بين طرفهاي.
Introduction to the course
Network Hardware and Protocols
Introduction to Systems Security
Course Information Teacher: Cliff Zou Office: HEC
Linux and TCP/IP Networking
17th APAN Meetings & Joint Techs Workshop
Intro Cyber Security Labs on GENI
Re- engineeniering.
USN Introduction Computer Engineering Sejin Oh.
Talking Malware Analysis with MITRE
System/application software
COVERT STORAGE CHANNEL MODULE
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
Intro Cyber Security Labs on GENI
On to Object Design c. 14.
Presentation transcript:

Techniques, Tools, and Research Issues Virus Analysis Techniques, Tools, and Research Issues Michael Venable Arun Lakhotia University of Louisiana at Lafayette, USA

Tutorial Objectives Provide background to initiate research in malware analysis. Initiate discussions on a distributed, collaborative, university-based reverse-engineering team

What Will Be Discussed Introduction to malware Description of lab environment and tools Setting up a secure environment Static and dynamic analysis tools Techniques for analyzing malware Hands-on analysis of Beagle.J Research in virus analysis Survey Distributed virus analysis framework

Pre-requisites Windows and Linux usage Programming background Running programs Windows Registry Programming background Assembly Language Using debuggers C programming Socket programming Networking TCP/UDP communication packets Setting up host tables, DNS queries