Anti-Stealth Techniques: Heuristically Detecting x64 Bootkits

  • Tuesday, February 25, 2014 | 1:20 PM – 1:40 PM | West | Room: 3006

View all Sessions

Stealth and persistency are invaluable assets to an intruder. You cannot defend against what you cannot see. Will share techniques to counter attempts at subverting modern security features, and regain control of compromised machines by drilling down deep into internal structures of the operating system to analyze anomalies within the boot sectors.


This document was retrieved from on Tue, 18 Jun 2019 20:58:14 -0400.