Anti-Stealth Techniques: Heuristically Detecting x64 Bootkits

  • Tuesday, February 25, 2014 | 1:20 PM – 1:40 PM | West | Room: 3006
View all Sessions

Stealth and persistency are invaluable assets to an intruder. You cannot defend against what you cannot see. Will share techniques to counter attempts at subverting modern security features, and regain control of compromised machines by drilling down deep into internal structures of the operating system to analyze anomalies within the boot sectors.

Participants

This document was retrieved from http://www.rsaconference.com/events/us14/agenda/sessions/975/anti-stealth-techniques-heuristically-detecting-x64 on Sun, 23 Nov 2014 05:57:23 -0500.
© 2014 EMC Corporation. All rights reserved.