ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Malware Classification With Machine Learning Enhanced by Windows Kernel Emulation

Автор: Black Hat

Загружено: 2022-11-17

Просмотров: 1467

Описание: This session will present a hybrid machine learning architecture that simultaneously utilizes static and dynamic malware analysis methodologies. We employ the Windows kernel emulator published by Mandiant for dynamic analysis and process emulation reports with a 1D convolutional neural network. On the contrary, static analysis is based on the state-of-the-art ensemble model publicly released by Endgame.

Presented by: Dmitrijs Trizna

Full Abstract and Presentation Materials: https://www.blackhat.com/us-22/briefi...

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Malware Classification With Machine Learning Enhanced by Windows Kernel Emulation

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

eBPF ELFs JMPing Through the Windows

eBPF ELFs JMPing Through the Windows

Leveraging the Apple ESF for Behavioral Detections

Leveraging the Apple ESF for Behavioral Detections

XUnprotect: Reverse Engineering macOS XProtect Remediator

XUnprotect: Reverse Engineering macOS XProtect Remediator

Consent & Compromise: Abusing Entra OAuth for Fun and Access to Internal Microsoft Applications

Consent & Compromise: Abusing Entra OAuth for Fun and Access to Internal Microsoft Applications

MICCAI Industrial Talk: Optimizing Ultrasound Image Similarity Search - Jan 6. 2026

MICCAI Industrial Talk: Optimizing Ultrasound Image Similarity Search - Jan 6. 2026

Робототехническая революция стала реальностью: почему Boston Dynamics и Figure вот-вот изменят всё.

Робототехническая революция стала реальностью: почему Boston Dynamics и Figure вот-вот изменят всё.

Clustered Points of Failure - Attacking Windows Server Failover Clusters

Clustered Points of Failure - Attacking Windows Server Failover Clusters

🧛КРОВОПИЙЦЫ НА ОХОТЕ: Зе-Бубенцы Лубинца. Тучи Эпштейна над Стармером. Автозак Коломойского - Спивак

🧛КРОВОПИЙЦЫ НА ОХОТЕ: Зе-Бубенцы Лубинца. Тучи Эпштейна над Стармером. Автозак Коломойского - Спивак

Locknote: Conclusions and Key Takeaways from Black Hat USA 2022

Locknote: Conclusions and Key Takeaways from Black Hat USA 2022

Your Traffic Doesn't Lie: Unmasking Supply Chain Attacks via Application Behaviour

Your Traffic Doesn't Lie: Unmasking Supply Chain Attacks via Application Behaviour

Keynote: Inside the Ransomware Machine

Keynote: Inside the Ransomware Machine

Introduction to Threat Hunting Using Garuda Framework - Hunting Living off the land attack (LoLbin)

Introduction to Threat Hunting Using Garuda Framework - Hunting Living off the land attack (LoLbin)

Back to the Future: Hacking and Securing Connection-based OAuth Architectures

Back to the Future: Hacking and Securing Connection-based OAuth Architectures

Derandomizing the Location of Security-Critical Kernel Objects in the Linux Kernel

Derandomizing the Location of Security-Critical Kernel Objects in the Linux Kernel

We Need To Talk About AI...

We Need To Talk About AI...

No VPN Needed? Cryptographic Attacks Against the OPC UA Protocol

No VPN Needed? Cryptographic Attacks Against the OPC UA Protocol

Lost in Translation: Exploiting Unicode Normalization

Lost in Translation: Exploiting Unicode Normalization

Diving into Windows HTTP: Unveiling Hidden Preauth Vulnerabilities in Windows HTTP Services

Diving into Windows HTTP: Unveiling Hidden Preauth Vulnerabilities in Windows HTTP Services

WIELKA WYPRAWA MARII WIERNIKOWSKIEJ W GŁĄB ROSJI #1

WIELKA WYPRAWA MARII WIERNIKOWSKIEJ W GŁĄB ROSJI #1

Safe Harbor or Hostile Waters: Unveiling the Hidden Perils of the TorchScript Engine in PyTorch

Safe Harbor or Hostile Waters: Unveiling the Hidden Perils of the TorchScript Engine in PyTorch

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]