VB2016 paper: Open Source Malware Lab

Posted by   Martijn Grooten on   Jan 4, 2017

Security experts aren't necessarily known for being skilled at predicting the future, but if there's one prediction they are guaranteed to get right, it's that there will be a lot of new malware in the coming year.

As a consequence, increasing numbers of companies and researchers are likely to turn their attentions to setting up their own malware analysis labs. For those tasked with doing so on a limited budget, there is good news: you can get a long way simply by using open source tools, as demonstrated by ThreatConnect researcher Robert Simmons in his VB2016 paper "Open Source Malware Lab".

VB2016-dates-web.jpg

Whether you are setting up a new malware analysis lab, or want to see how your existing lab can be improved, we have uploaded Robert's paper in both HTML and PDF format. We have also uploaded the presentation video to our YouTube channel.

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

VB2017 call for last-minute papers opened

Today, we open the call for last-minute papers for VB2017. Submit before 3 September to have your abstract considered for one of the ten slots reserved for 'hot' research.

Five reasons to come to VB2017 in Madrid

We're not ones to make bold claims about our conference, and we suggest you ask past attendees for their opinion, but here are five reasons why we think you should come to VB2017 in Madrid.

DMARC: an imperfect solution that can make a big difference

US Senator Ron Wyden has asked the Department of Homeland Security to implement DMARC. Martijn Grooten looks at what difference this could make for phishing attacks impersonating the US federal governent.

Advanced and inept persistent threats to be discussed at VB2017

Unsurprisingly given today's threat landscape, the VB2017 programme contains several talks on various advanced persistent threats - but also a talk on what may be the polar opposite of such threats: an inept persistent threat.

Password security is 1% choosing a half-decent password, 99% not using it anywhere else

Password security advice focuses too much on password strength and too little on avoiding password reuse, Martijn Grooten argues.