Looking deeper within malware yields fingerprints of the hackers who write the code, and that could result in signatures that have a longer lifetime than current intrusion-detection schemes, Black Hat 2010 attendees will be told next week. Analysis of the binaries of malware executables also reveals characteristics about the intent of the attack code that could make for more efficient and effective data defenses, says Greg Hoglund, CEO of HBGary, whose briefing "Malware Attribution: Tracking Cyber Spies and Digital Criminals" is scheduled for the Las Vegas conference. Hoglund says this analysis uncovers tool marks -- signs of the environments in which the code was written -- that can help identify code written by a common person or group based on what combination of tools they use.
**Hidden Content: To see this hidden content your post count must be 1 or greater.**


Reply With Quote
