際際滷shows by User: jordiibcn / http://www.slideshare.net/images/logo.gif 際際滷shows by User: jordiibcn / Sun, 09 Nov 2014 07:14:21 GMT 際際滷Share feed for 際際滷shows by User: jordiibcn Emulate virtual machines to avoid malware infections - GrrCON 2014 /slideshow/emulate-virtual-machines-to-avoid-malware-infections-grrcon-2014-41313933/41313933 emulatevmstoavoidmalwareinfections-jordivazquez-grrcon-141109071421-conversion-gate01
A large amount of current malware uses various anti-virtual-machine techniques in order to avoid detection by analysis. These techniques allow the malware to detect the virtual machine which will then execute a benign action or simply do nothing. Many of these techniques are bases on finding specific files in the system or consulting some windows registry keys. The purpose of this research is to study the characteristics of the ORacle Virtual Box virtualized system and try to replicate the configuration on a physical computer, in order to trick malware into thinking it is in a virtual environment and thus not triggering its execution.]]>

A large amount of current malware uses various anti-virtual-machine techniques in order to avoid detection by analysis. These techniques allow the malware to detect the virtual machine which will then execute a benign action or simply do nothing. Many of these techniques are bases on finding specific files in the system or consulting some windows registry keys. The purpose of this research is to study the characteristics of the ORacle Virtual Box virtualized system and try to replicate the configuration on a physical computer, in order to trick malware into thinking it is in a virtual environment and thus not triggering its execution.]]>
Sun, 09 Nov 2014 07:14:21 GMT /slideshow/emulate-virtual-machines-to-avoid-malware-infections-grrcon-2014-41313933/41313933 jordiibcn@slideshare.net(jordiibcn) Emulate virtual machines to avoid malware infections - GrrCON 2014 jordiibcn A large amount of current malware uses various anti-virtual-machine techniques in order to avoid detection by analysis. These techniques allow the malware to detect the virtual machine which will then execute a benign action or simply do nothing. Many of these techniques are bases on finding specific files in the system or consulting some windows registry keys. The purpose of this research is to study the characteristics of the ORacle Virtual Box virtualized system and try to replicate the configuration on a physical computer, in order to trick malware into thinking it is in a virtual environment and thus not triggering its execution. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/emulatevmstoavoidmalwareinfections-jordivazquez-grrcon-141109071421-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A large amount of current malware uses various anti-virtual-machine techniques in order to avoid detection by analysis. These techniques allow the malware to detect the virtual machine which will then execute a benign action or simply do nothing. Many of these techniques are bases on finding specific files in the system or consulting some windows registry keys. The purpose of this research is to study the characteristics of the ORacle Virtual Box virtualized system and try to replicate the configuration on a physical computer, in order to trick malware into thinking it is in a virtual environment and thus not triggering its execution.
Emulate virtual machines to avoid malware infections - GrrCON 2014 from Jordi Vzquez
]]>
373 1 https://cdn.slidesharecdn.com/ss_thumbnails/emulatevmstoavoidmalwareinfections-jordivazquez-grrcon-141109071421-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Riesgos de seguridad en la carga de dispositivos m坦ciles https://es.slideshare.net/slideshow/riesgos-de-seguridad-en-la-carga-de-dispositivos-mciles/11845071 rooted-120303092700-phpapp02
]]>

]]>
Sat, 03 Mar 2012 09:26:57 GMT https://es.slideshare.net/slideshow/riesgos-de-seguridad-en-la-carga-de-dispositivos-mciles/11845071 jordiibcn@slideshare.net(jordiibcn) Riesgos de seguridad en la carga de dispositivos m坦ciles jordiibcn <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/rooted-120303092700-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
from Jordi Vzquez
]]>
237 2 https://cdn.slidesharecdn.com/ss_thumbnails/rooted-120303092700-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Seguretat informtica /slideshow/seguretat-informtica/10176224 seguretatinformtica-111115162730-phpapp02
Exposici坦 Treball de Recerca Jordi V叩zquez Aira Ies sert 2011.]]>

Exposici坦 Treball de Recerca Jordi V叩zquez Aira Ies sert 2011.]]>
Tue, 15 Nov 2011 16:27:28 GMT /slideshow/seguretat-informtica/10176224 jordiibcn@slideshare.net(jordiibcn) Seguretat informtica jordiibcn Exposici坦 Treball de Recerca Jordi V叩zquez Aira Ies sert 2011. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/seguretatinformtica-111115162730-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Exposici坦 Treball de Recerca Jordi V叩zquez Aira Ies sert 2011.
Seguretat informtica from Jordi V叩zquez
]]>
570 124 https://cdn.slidesharecdn.com/ss_thumbnails/seguretatinformtica-111115162730-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-jordiibcn-48x48.jpg?cb=1582624719 http://www.jordivazquez.com https://cdn.slidesharecdn.com/ss_thumbnails/emulatevmstoavoidmalwareinfections-jordivazquez-grrcon-141109071421-conversion-gate01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/emulate-virtual-machines-to-avoid-malware-infections-grrcon-2014-41313933/41313933 Emulate virtual machin... https://cdn.slidesharecdn.com/ss_thumbnails/rooted-120303092700-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/riesgos-de-seguridad-en-la-carga-de-dispositivos-mciles/11845071 Riesgos de seguridad e... https://cdn.slidesharecdn.com/ss_thumbnails/seguretatinformtica-111115162730-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/seguretat-informtica/10176224 Seguretat informtica