/vx/Papers/AV Tech/

0 directories 42 files
Name Size Modified
Go up
2007-06-16 - Minifilters for detection of Malware.pdf 710 KiB
2008-11-10 - Advanced Metamorphic Techniques in Computer Viruses.pdf 311 KiB
2009-06-28 - AVU (Anti Virus UNIX) Demonstration.tgz 209 KiB
2010-02-03 - Sequence Based Malware Detection.pdf 273 KiB
2015-03-17 - Kprobe instrumentation based kernel patching code.tgz 2.8 KiB
2017-01-22 - Anti-emulation trends in modern packers.pdf 589 KiB
2018-06-27 - Fixing ELF static binaries with ASLR RELRO support.pdf 142 KiB
2018-09-12 - Office VBA - AMSI Parting the veil on malicious macros.pdf 1.3 MiB
2018-09-27 - Out of sight but not invisible - Defeating fileless malware with behavior monitoring AMSI and next-gen .pdf 1.6 MiB
2018-11-18 - Preventing Ransomware Attacks Through File System Filter Drivers.pdf 740 KiB
2019-11-12 - Threat Hunting In Calltrace.pdf 3.2 MiB
2021-01-05 - Automatic Reverse Engineering of Script Engine Binaries for Building Script API Tracers.pdf 6.9 MiB
2021-01-27 - Analysis of Antivirus Quarantine Files.pdf 173 KiB
2021-01-29 - Hunting in the Sysmon Call Trace.pdf 4.6 MiB
2021-02-10 - Detecting Manual Syscalls from User Mode.pdf 147 KiB
2021-05-24 - Hunting for Suspicious Usage of Background Intelligent.pdf 922 KiB
2021-07-09 - An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors.pdf 5.5 MiB
2021-08-23 - An Empirical Assessment of Endpoint Security Systems Against Advanced Persistent Threats Attack Vectors.pdf 8.2 MiB
2021-11-14 - Instrumentation Callbacks - Detecting SYSCALLs.zip 15 KiB
2021-12-26 - Gatekeeping SysCalls.pdf 396 KiB
2022-01-11 - An Empirical Assessment of Endpoint Security Systems Against Advanced Persistent Threats Attack Vectors v3 FINAL.pdf 9.8 MiB
2022-02-02 - Elastic Security - Sandboxing Antimalware Products.pdf 149 KiB
2022-02-22 - Writing a C Yara Agent.pdf 424 KiB
2022-03-15 - Anti-UPX Unpacking Technique.pdf 391 KiB
2022-04-29 - Maelstrom EDR Kernel Callbacks Hooks and Call Stacks.pdf 2.2 MiB
2022-06-30 - Using process creation properties to catch evasion techniques.pdf 712 KiB
2022-07-10 - Patriot - Detecting various kinds of in-memory stealth techniques .zip 2.8 KiB
2023-02-10 - Forensic Log-Based Detection of Keystroke Injection BadUSB Attacks.pdf 2.3 MiB
2023-04-19 - Demonstrating monitoring abnormal syscalls with ETW.zip 108 KiB
2023-04-27 - The Art of Clipboard Forensics Recovering Deleted Data.pdf 645 KiB
2023-05-21 - PCAPeek - PoC reassembler for reverse VNC traffic.zip 28 KiB
2023-05-23 - Dynamic Detection and Classification of Persistence Techniques in Windows malware.pdf 612 KiB
2023-07-15 - Unveiling Secrets in Binaries using Code Detection Strategies.7z 58 MiB
2023-08-02 - Using Call Frequency to Identify API Functions.7z 7.2 MiB
2023-10-06 - Reflective call stack detections and evasions.pdf 1.6 MiB
2023-10-10 - A Hitch-hackers Guide to DACL-Based Detections - Part 1.pdf 2.8 MiB
2023-10-12 - A Hitch-hackers Guide to DACL-Based Detections - Part 2.pdf 2.3 MiB
2023-10-17 - A Hitch-hackers Guide to DACL-Based Detections - Part 3.pdf 2.3 MiB
2023-12-01 - Defeating Ransomware Through Vulnerability Exploitation.pdf 46 KiB
2023-12-04 - Defeating Ransomware Thru Vulnerability Exploitation .pdf 46 KiB
2024-03-31 - KasperskyHook - Hooking system calls using Kaspersky hypervisor.zip 1.4 MiB
2024-09-14 - Ballin' on a budget A Quick Guide to Defining Malware with $0, Python3, and Windows.pdf 940 KiB