{"id":10664,"date":"2022-07-08T02:23:04","date_gmt":"2022-07-08T02:23:04","guid":{"rendered":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/?post_type=session&#038;p=10664"},"modified":"2024-09-03T02:22:26","modified_gmt":"2024-09-03T02:22:26","slug":"hunting-trojans-with-ast-transformers-and-machine-learning","status":"publish","type":"session","link":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/hunting-trojans-with-ast-transformers-and-machine-learning\/","title":{"rendered":"Hunting Trojans with AST Transformers and Machine Learning"},"content":{"rendered":"<p><strong><a href=\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/materials\/D1T1%20-%20Hunting%20Trojans%20with%20AST%20Transformers%20and%20Machine%20Learning%20-%20Stanislav%20Rakovsky.pdf\">PRESENTATION SLIDES<\/a><\/strong><\/p>\n<p>In this presentation, you&#8217;ll understand why you learned graph theory and machine learning at university \ud83d\ude42 The speaker will discuss what awaits you in the Python ecosystem if you carelessly download a Trojan-infected project. We will explore the obfuscation techniques used by malicious actors to complicate their detection and analysis \u2014 and how to counter them using AST Transformers. We will also demonstrate how machine learning can be effectively used to detect malicious projects.<\/p>\n","protected":false},"template":"","class_list":["post-10664","session","type-session","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hunting Trojans with AST Transformers and Machine Learning - HITBSecConf2024 - Bangkok<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/hunting-trojans-with-ast-transformers-and-machine-learning\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hunting Trojans with AST Transformers and Machine Learning - HITBSecConf2024 - Bangkok\" \/>\n<meta property=\"og:description\" content=\"PRESENTATION SLIDES In this presentation, you&#8217;ll understand why you learned graph theory and machine learning at university \ud83d\ude42 The speaker will discuss what awaits you in the Python ecosystem if you carelessly download a Trojan-infected project. We will explore the obfuscation techniques used by malicious actors to complicate their detection and analysis \u2014 and how [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/hunting-trojans-with-ast-transformers-and-machine-learning\/\" \/>\n<meta property=\"og:site_name\" content=\"HITBSecConf2024 - Bangkok\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-03T02:22:26+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/hunting-trojans-with-ast-transformers-and-machine-learning\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/hunting-trojans-with-ast-transformers-and-machine-learning\/\",\"name\":\"Hunting Trojans with AST Transformers and Machine Learning - HITBSecConf2024 - Bangkok\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/#website\"},\"datePublished\":\"2022-07-08T02:23:04+00:00\",\"dateModified\":\"2024-09-03T02:22:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/hunting-trojans-with-ast-transformers-and-machine-learning\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/hunting-trojans-with-ast-transformers-and-machine-learning\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/hunting-trojans-with-ast-transformers-and-machine-learning\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Session\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hunting Trojans with AST Transformers and Machine Learning\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/\",\"name\":\"HITBSecConf2024 - Bangkok\",\"description\":\"August 26 - 30 @ InterContinental\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hunting Trojans with AST Transformers and Machine Learning - HITBSecConf2024 - Bangkok","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/hunting-trojans-with-ast-transformers-and-machine-learning\/","og_locale":"en_US","og_type":"article","og_title":"Hunting Trojans with AST Transformers and Machine Learning - HITBSecConf2024 - Bangkok","og_description":"PRESENTATION SLIDES In this presentation, you&#8217;ll understand why you learned graph theory and machine learning at university \ud83d\ude42 The speaker will discuss what awaits you in the Python ecosystem if you carelessly download a Trojan-infected project. We will explore the obfuscation techniques used by malicious actors to complicate their detection and analysis \u2014 and how [&hellip;]","og_url":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/hunting-trojans-with-ast-transformers-and-machine-learning\/","og_site_name":"HITBSecConf2024 - Bangkok","article_modified_time":"2024-09-03T02:22:26+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/hunting-trojans-with-ast-transformers-and-machine-learning\/","url":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/hunting-trojans-with-ast-transformers-and-machine-learning\/","name":"Hunting Trojans with AST Transformers and Machine Learning - HITBSecConf2024 - Bangkok","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/#website"},"datePublished":"2022-07-08T02:23:04+00:00","dateModified":"2024-09-03T02:22:26+00:00","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/hunting-trojans-with-ast-transformers-and-machine-learning\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/hunting-trojans-with-ast-transformers-and-machine-learning\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/hunting-trojans-with-ast-transformers-and-machine-learning\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/"},{"@type":"ListItem","position":2,"name":"Session","item":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/"},{"@type":"ListItem","position":3,"name":"Hunting Trojans with AST Transformers and Machine Learning"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/#website","url":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/","name":"HITBSecConf2024 - Bangkok","description":"August 26 - 30 @ InterContinental","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-json\/wp\/v2\/session\/10664"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-json\/wp\/v2\/session"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-json\/wp\/v2\/types\/session"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-json\/wp\/v2\/media?parent=10664"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}