Techniques for evading automated analysis

2013-02-04

Abhishek Singh

FireEye, USA
Editor: Helen Martin

Abstract

Abhishek Singh looks at some of the techniques that are commonly used by malware to bypass analysis in a virtualized environment.


The full article is available to registered users. Click here for free registration or, if you already are a registered user, login to access the full article.

Quick Links

Poll
Should software vendors extend support for their products on Windows XP beyond the end-of-life of the operating system?
Yes - it keeps their users secure
No - it encourages users to continue to use a less secure OS
I don't know
Leave a comment
View 23 comments

AusCert2014

Malware Prevalence
Adware-misc |##########|
Java-Exploit |########|
Autorun |#####|
BHO/Toolbar-misc |####|
Conficker/Downadup |###|
 View this month's full report

Virus Bulletin currently has 231,293 registered users.