Friday 6 October 12:00 - 12:30, Red roomGilbert Sison (Trend Micro)
Recently, the security industry has adopted various machine-learning solutions to proactively prevent malware from infecting a system. This has the potential to be a game changer in the fight against malware. However, at this early stage of machine learning in the AV industry, recent malware innovations are already showing how this next-gen AV solution can be bypassed. This paper aims to show what techniques are readily available for malware writers to use to have a chance at infecting a system even with machine-learning-based security in place.
First, we will provide an overview of the two most common machine-learning approaches that are being used by the AV industry today, along with the pros and cons of using each one (static vs. dynamic). We will then describe how these machine-learning approaches are affected by already established malware techniques that have proven to be effective against previous AV solutions. Next, we will discuss the latest innovations being used by malware authors to bypass these machine-learning solutions. Finally, we will show the possible trade-offs of actually using these malware innovations against the overall security solutions offered by the AV industry today.
Gilbert Sison has worked at Trend Micro for over ten years. During his tenure, he has filled the roles of malware analyst, pattern QA, product tester, team manager, and malware researcher. The bulk of his career has been spent reverse engineering threats and finding ways to improve how endpoint products handle malware threats. Currently, he is a part of a specialized team responsible for research and deep analysis of hot malware families.
Brian Cayanan has been in the anti-malware industry for more than 10 years and has gained genuine knowledge and expertise in the field of computer and network security. He started his career as one of Trend Micro's malware analysts and has developed advanced skills in malware reverse engineering and malware forensics. Over the years, he has taken up a number of different roles within the company such as threat researcher, big data analyst, and operations team lead. He is currently head of a specialized team within Trend Micro responsible for research and deep analysis of current hot malware families in the wild.
Thiago Marques (Kaspersky Lab)
Fabio Assolini (Kaspersky Lab)
Of all the forms of attack against financial institutions in the world, the ones that are most likely to combine traditional…
Juan Andres Guerrero-Saade (Kaspersky Lab)
Costin Raiu (Kaspersky Lab)
Attribution is complicated under the best of circumstances. Sparse attributory indicators and the possibility of overt…
John Graham-Cumming (Cloudflare)
In February 2017, Cloudflare was revealed to have been leaking private information including HTTP headers, cookies and POST data…