Live Malware Attack!

Abstract: 

If you are interested in the source code of tools used during the demo, please email conference@usenix.org for more information.

Pretty much everyone knows that there is a lot of hostile code out there. But how does a malware attack unfold? How do exploits work in real life? How easily might you be phished? More important, how do you deliberately go about watching malware at work (in both senses of "at work"), especially if it is malware that relies on the Internet to function?

This talk will feature a live—but entirely self-contained, and therefore safe!—demonstration of a modern malware attack in action. Gain insight into how the bad guys think and operate, and you learn how better to defend yourself against them.

The talk will also examine some of the tricks and techniques that can be used in a malware research lab to get even an apparently complex and heavily obfuscated piece of malware to reveal its secrets in safety.

Paul Ducklin works for Sophos in Australia, where he does assorted security stuff. He is Head of Technology, Asia Pacific. If you find out what this means, please attend his talk so that you can tell him.

Open Access Media

USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.

BibTeX
@conference {268586,
author = {Paul Ducklin},
title = {Live Malware Attack!},
year = {2007},
address = {Santa Clara, CA},
publisher = {USENIX Association},
month = jun
}

Presentation Video

Presentation Audio