Finding rules for heuristic detection of malicious PDFs: with analysis of embedded exploit code

Paul Baccas Sophos

  download slides (PDF)

The use of PDFs as a vector for the installation of malicious content has been on the rise over the last few years. This has been for numerous reasons, some of which are the ubiquity of the file format (not browser or platform dependent); the update mechanisms for Adobe; and also the many and various exploit kits.

Methods for detection and classification of malware have been focused on EXE, MS Office and HTML analysis and the lack of research in PDF is telling. In this paper we show some tips and tricks to help classification and detection of malicious PDFs. This will be achieved by both static and dynamic analysis of malicious files and Internet-derived corpuses of, potentially, clean files.

As well as communicating these results, the presentation will augment them with analysis of current threats and case studies of whole attacks.

VB Conferences

VB2016 (Denver)

VB2015 (Prague)

VB2014 (Seattle)

VB2013 (Berlin)

VB2012 (Dallas)

VB2011 (Barcelona)

VB2010 (Vancouver)

VB2009 (Geneva)

VB2008 (Ottawa)

VB2007 (Vienna)

VB2006 (Montréal)

VB2005 (Dublin)

VB2004 (Chicago)

VB2003 (Toronto)

VB2002 (New Orleans)

VB2001 (Prague)

VB2000 (Orlando)

VB99 (Vancouver)

VB98 (Munich)

VB97 (San Francisco)

VB96 (Brighton)

VB95 (Boston)

VB94 (Jersey)

VB93 (Amsterdam)

VB92 (Edinburgh)

VB91 (Jersey)

‘This was my first attendance at a Virus Bulletin conference and I found it extremely worthwhile - excellent speakers, good discussions, valuable networking and generally a decent educational venue.’

Jobs Recruit Sidebar