Infiltrate Security Conference OPEN CFP

TALK PROFILE
This CFP is not yet open - Check back soon!

Creating Your Own Customized Metamorphic Algorithm

Vulnerability Development
45

Most malware uses metamorphic code to evade Antivirus detection. These techniques also slow down security researchers when digging deeper into the malware code. On the malware side, there are many ways to generate and implements the said algorithms, yet our ultimate goal is to detect them. Let's turn the table for a while. Let's pretend that we are the malware author trying to make our own metamorphic code. In this presentation, we will discussed how to reverse engineer Virlock, a ransomware that uses metamorphic and polymorphic code, and also capable of infecting executable files. Also in this presentation, based on the Virlock ransomware code, we are going to think as the malware author designing the metamorphic code. We will try to enhance the original design to make the code stronger. And at the end, we will try to think as the security researcher that we are, to mitigate our invention.

Back to Open CFP
Rated 4 - 31 reviewers

Comments

citizenx

Metamorphism is really interesting! I hope this will be about advanced metamophic technics!

Interested in Speaking?

We are pleased to announce the Call For Papers for INFILTRATE 2018 is now open. If you would like to present and have an offense-focused-fresh-content presentation, please submit an abstract, Bio and headshot to cfp@immunityinc.com. This information will be included on our Open CFP site, here, where the public can vote on which presentations they are most interested in seeing at INFILTRATE. Call for papers will close on December 14th, 2017. Shortly after this date, the winning speakers will be notified.

Some of the benefits of speaking at INFILTRATE are: