HITB-Invoice-Logo

thank you for joining us!

Best Practices For Simulating Execution in Malicious Text Detection

Date

August 26, 2022

Time

11:00

Track

CommSec Track

Static detection is the earliest text detection method, and it is still widely used since its birth. But in fact, the effect of static detection depends on the extraction of text features, and the dimension of the features directly determines the false positive rate and the false negative rate. The mainstream static detection methods have the characteristics of fast detection speed, good universality (cross-platform, cross-version, cross-language, etc.), and low implementation cost (in theory, as long as it is a black sample, rules can be written to cover it); however, due to the lack of Lexical and grammatical constraints are more prone to false positives, and at the same time, lack of adversarial and technical barriers makes this type of detection algorithm difficult to detect when it encounters packed, encrypted, and obfuscated samples, and cannot form a differentiated advantage.

When the static feature extraction of malicious text is accurate enough, it is easier to detect. However, attackers usually use code obfuscation (packing, encoding, encryption) to hinder the extraction of features, so it is necessary to dynamically run and run all features for detection. The dynamic detection algorithm is technically difficult, and can implement more advanced and complex detection techniques. At the same time, due to real execution, the malicious code conforms to syntax and lexical constraints, and false positives are extremely low without forced intervention. However, since real execution requires simulation and custom design of the entire operating environment, there are problems of high cost, low detection efficiency, and poor compatibility. At the same time, when encountering the problem of version fragmentation, it is also a tedious thing to adapt to different versions of the sandbox. The sandbox solution also introduces new confrontation problems, such as branch confrontation, time confrontation, network confrontation, etc.

During this presentation, the audience will hear the following:

  • Cloud Intrusion Attack Skills and Advanced Attack Utilization Skills.
  • The dilemma of traditional detection schemes (static matching, dynamic sandbox) in malicious text detection.
  • Simulate the implementation of malicious text detection.
  • How to use the external ecology to improve the detection water level.

Speakers

Researcher

National University Singapore

Dr. Wang Kailong is currently a research fellow at National University of Singapore (NUS). He received his PhD degree from School of Computing NUS in 2022. He has worked as a Research Assistant in NUS while pursuing his PhD degree from 2016 to 2021. His research interests include mobile and web security and privacy, and protocol verification. His works have appeared in the top conferences such as WWW and MobiCom.

Co-Founder & CTO

Authomize

Mr. Gal Diskin is a cybersecurity and AI researcher. He was previously the VP & head of Palo Alto Networks’ Israeli site, and is a serial entrepreneur. Mr. Diskin’s research has been featured in HITB, Defcon, Black Hat, CCC, and other conferences, spanning fields from low level security research such as hardware vulnerabilities, binary instrumentation, and car hacking to high level research on AI detection methods, Enterprise security, and Identity security. Mr. Diskin was also the technical lead and co-founder of Intel’s software security organization, as well as the CTO of Cyvera and HeXponent (co-founder) before their acquisition.

Senior Security Researcher

Huajiang โ€œKevin2600โ€ Chen (Twitter: @kevin2600) is a senior security researcher. He mainly focuses on vulnerability research in wireless and Vehicle security. He is a winner of GeekPwn 2020 and also made to the Tesla hall of fame 2021. Kevin2600 has spoken at various conferences including KCON; DEFCON and CANSECWEST.

Security Researcher

Li Siwei is a security researcher. He specializes in Big data analysis and AI Security.

Founder, CEO

CloudSEK

Rahul Sasi is an Indian entrepreneur, Founder of CloudSEK, and a security expert. He was voted as the top influential Cyber Security person in 2015, he has made a significant open source contribution to the security landscape and is an invited speaker to over 20+ countries. He is part of the working committees of RBI and MeitY.
CloudSEK : https://cloudsek.com/
LinkedIn: https://www.linkedin.com/in/fb1h2s/

Senior Security Engineer

CloudSEK

Vishal Singh is working as a Senior Security Engineer at CloudSEK. His main responsibility includes handling the Research & Development of CloudSEK ASM. He loves automating manual effort tasks, and also likes net surfing & exploring new places in his free time.

Other Talks in This Track

LOCATION

CommSec Track

DATE

August 26

TIME

16:30

LOCATION

CommSec Track

DATE

August 26

TIME

17:30

LOCATION

CommSec Track

DATE

August 26

TIME

12:00