Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis

Hacker in the Box (HITB) Security Conference 2013 • 165, Jalan Ampang, 50450 Kuala Lumpur, Malaysia

500
People

Rahul Sasi

Founder and CTO at CloudSEK

Send message

Talk summary

With the rise in the number of targeted attacks against government and private companies, there is a certain requirement for automated exploit analysis and filtering document file formats.
There is a large number of companies offering solutions and products claiming to be able to detect these kinds of threats (APTs). Our talk would be on the current drawbacks of these systems and how on how to perform intelligent analysis on a huge number of exploits. The aim of the talk would be to explain the intelligence that we have added on to our automation system using dynamic instrumentation and hybrid analysis so that users could learn and utilize these techniques in detecting targeted attacks and automate exploit analysis.
We have been working on an exploit analysis system, a free tool developed under the Honeynet project. In my talk, I would pass on to the users the various techniques I have learned from my past several months of adventures had with exploit analysis, that involves but not limited to exploit obfuscation, exploit reliability, automated analysis bypass, attribution, multi-targeting and everything that makes targeted attacks scary.

About this talk

Type

Keynote

Date

On October 17th, 2013

Event

Hacker in the Box (HITB) Security Conference 2013 (go to website)

Location

165, Jalan Ampang, 50450 Kuala Lumpur, Malaysia

Audience size

In front of 500 people