Presented at
DerbyCon 3.0 All in the Family (2013),
Sept. 27, 2013, 7 p.m.
(50 minutes).
Think of the last time you got sick. Your immune system is an amazing piece of machinery, but every now and then, something gets past it. Antivirus evasion techniques can become more effective when modeled after infectious diseases. This talk highlights many of the antivirus evasion techniques in use today. Going further, this talk shows how genetic algorithms can quickly and repeatedly “evolve” code to evade many malicious code detection techniques in use today. Trenton will be releasing a BETA version of a tool for the shellcode Ghostwriting process.
Presenters:
-
Trenton Ivey
Trenton has had the desire to understand how things work since early childhood. Hacking, programming, reverse engineering, and electronics quickly became some of his favorite hobbies. Trenton went to college with the hopes of becoming a doctor. After surviving classes like Advanced Genetics, Immunology, Cellular Biology, Biochemistry, and Organic Chemistry, he graduated college with a major in biology and a minor in chemistry. After undergraduate school, Trenton was able to work in a remote Hospital Lab in Zimbabwe, Africa. It was during this time that, through a strange turn of events, he realized his true passion was Information Security. Years later, Trenton now leads the Network Pentesting Team at a Fortune 500 company.
Similar Presentations: