Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Stealth malware - can good guys win?

Type
Slides
Tags
malware
Authors
Joanna Rutkowska
Event
Chaos Communication Congress 23th (23C3) 2006
Indexed on
Mar 27, 2013
URL
http://events.ccc.de/congress/2006/Fahrplan/attachments/1207-stealthmalwaretowardsverifiablesystems.ppt
File name
1207-stealthmalwaretowardsverifiablesystems.ppt
File size
1.9 MB
MD5
5346a8871fc28226a8a5f7aea62227f1
SHA1
d1ec0cc206ebe1781200aae4af92f3c3ae01040a

The presentation will try to present current challenges in detecting advanced forms of stealth malware and explain why current detection approaches, as used in commercial A/V or IDS products, are insufficient. The author will try to convince the audience that *detection* is no less important then *prevention* and that we need a *systematic* approach to implement a good compromise detector, instead of a bunch of "hacks" as we have today.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !