TyphoonCon
  • About
    • About Us
    • Venue
    • Press
    • Sponsorship
    • Code Of Conduct
    • Past events
      • TyphoonCon 2023
      • TyphoonCon 2022
      • TyphoonCon 2020
      • TyphoonCon 2019
    • Contact
  • Conference
    • Call for Papers 2024
  • Training
    • Call for Training 2024
  • Competitions
    • TyphoonPWN
BUY TICKETS
  • About
    • About Us
    • Venue
    • Press
    • Sponsorship
    • Code Of Conduct
    • Past events
      • TyphoonCon 2023
      • TyphoonCon 2022
      • TyphoonCon 2020
      • TyphoonCon 2019
    • Contact
  • Conference
    • Call for Papers 2024
  • Training
    • Call for Training 2024
  • Competitions
    • TyphoonPWN
Menu
  • About
    • About Us
    • Venue
    • Press
    • Sponsorship
    • Code Of Conduct
    • Past events
      • TyphoonCon 2023
      • TyphoonCon 2022
      • TyphoonCon 2020
      • TyphoonCon 2019
    • Contact
  • Conference
    • Call for Papers 2024
  • Training
    • Call for Training 2024
  • Competitions
    • TyphoonPWN
BUY TICKETS
BUY TICKETS
  • About
    • About Us
    • Venue
    • Press
    • Sponsorship
    • Code Of Conduct
    • Past events
      • TyphoonCon 2023
      • TyphoonCon 2022
      • TyphoonCon 2020
      • TyphoonCon 2019
    • Contact
  • Conference
    • Call for Papers 2024
  • Training
    • Call for Training 2024
  • Competitions
    • TyphoonPWN
Menu
  • About
    • About Us
    • Venue
    • Press
    • Sponsorship
    • Code Of Conduct
    • Past events
      • TyphoonCon 2023
      • TyphoonCon 2022
      • TyphoonCon 2020
      • TyphoonCon 2019
    • Contact
  • Conference
    • Call for Papers 2024
  • Training
    • Call for Training 2024
  • Competitions
    • TyphoonPWN
Back to Agenda

Bypass Antivirus Dynamic Analysis, 9 Years Later

Talk overview:

This talk will introduce multiple new Antivirus Emulator bypass techniques as well as evaluate older ones and various files formats. Emeric will also go more in depth discussing the methodology in finding such techniques, and what are the intrinsic limits of payloads analysis in general. The goal is to attempt to  provide technical answers to the question "Are antivirus emulators engine still as easy to bypass?"

Share on

you might be interested in

Explore all talks
Keynote Speaker

How to build Skynet – a system that hacks systems

Professor Insu Yun
|
Assistant Professor at KAIST
Keynote Speaker

Exploring Offensive Security in Korea

Yongil Lee
|
CISO at Peoplefund

When Athletic Abilities Just Aren’t Enough – Scoreboard Hacking

Maxwell Dulin
|
Senior security consultant at Security Innovation
Explore all talks

Take part in The Best
All Offensive Security
Conference in Asia

Get your TyphoonCon tickets today!

buy tickets

for more information

Email Info@typhooncon.com

Follow us

  • Facebook
  • Twitter
  • Linkedin
  • Facebook
  • Twitter
  • Linkedin
  • Email