ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

932 results

VideoLecturesChannel
Robust Android Malware Detection Against Adversarial Example Attacks

Authors: Heng Li, Shiyao Zhou, Wei Yuan, Xiapu Luo, Cuiying Gao, Shuiyan Chen.

7:57
Robust Android Malware Detection Against Adversarial Example Attacks

209 views

4 years ago

droidcon & fluttercon
Hacking the Hackers’ Code: Inside Android Malware - Caner Kaya | droidcon Berlin 2025

Talk: Hacking the Hackers' Code: Inside Android Malware Speaker: Caner Kaya Event: droidcon Berlin 2025 Date: 24th ...

31:40
Hacking the Hackers’ Code: Inside Android Malware - Caner Kaya | droidcon Berlin 2025

166 views

2 months ago

NorthSec
Reversing Android Malware for the Smart and Lazy

... day on um android malware or iot malware um reversing uh those um those malware to well see what they are doing and detect ...

2:58:59
Reversing Android Malware for the Smart and Lazy

450 views

Streamed 4 years ago

BSides Oslo
BSides Oslo Digital Edition 2021 – Axelle Aprville – Live reverse engineering of Android malware

Have you ever wanted to see how Android malware work? How they are implemented? Which tools to use? This session is for ...

26:11
BSides Oslo Digital Edition 2021 – Axelle Aprville – Live reverse engineering of Android malware

214 views

4 years ago

BruCON Security Conference
11 - BruCON 0x0D - Android malware targeting Belgian Financial apps - Jeroen Beckers

Mobile malware has been around since the first versions of Android and iOS, ranging from premium-text scams to ransomwares to ...

1:00:54
11 - BruCON 0x0D - Android malware targeting Belgian Financial apps - Jeroen Beckers

693 views

4 years ago

DEFCONConference
DEF CON 31 - Runtime Riddles - Abusing Manipulation Points in the Android Source - Laurie Kirk

Android malware creators constantly struggle to devise innovative methods to obscure apps and impede reverse engineering.

41:59
DEF CON 31 - Runtime Riddles - Abusing Manipulation Points in the Android Source - Laurie Kirk

34,438 views

2 years ago

BSidesLV
Defeating Machine Learning: Systemic Deficiencies for Detecting Malware

Defeating Machine Learning: Systemic Deficiencies for Detecting Malware - Wes Connell, Ryan Peters Ground Truth BSidesLV ...

45:14
Defeating Machine Learning: Systemic Deficiencies for Detecting Malware

2,067 views

9 years ago

aafortinet
Unpacking Android malware with Medusa

In this video, we unpack a malicious sample of Android/Joker with an open source tool named Medusa. This tool is dynamic, ...

2:28
Unpacking Android malware with Medusa

2,079 views

3 years ago

CCS 2016
CCS 2016 - FeatureSmith: Automatically Engineering Features for Malware Detection

Title: FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature Authors: Ziyun ...

24:45
CCS 2016 - FeatureSmith: Automatically Engineering Features for Malware Detection

358 views

9 years ago

Lawrence Systems
Digital Forensics: How Malware Can Hide In Plain Sight

Connecting With Us --------------------------------------------------- + Hire Us For A Project: https://lawrencesystems.com/hire-us/ + Tom ...

14:55
Digital Forensics: How Malware Can Hide In Plain Sight

11,353 views

5 years ago

BruCON Security Conference
02 - BruCON 0x0F - Keynote: The Mobile Malware Maze - Axelle Apvrille

In this keynote presentation, we will delve into the fascinating evolution of mobile malware over the past 15 years. Exploring the ...

52:44
02 - BruCON 0x0F - Keynote: The Mobile Malware Maze - Axelle Apvrille

391 views

2 years ago

MalwareAnalysisForHedgehogs
Malware Theory - Why There Is No Perfect Antivirus Scanner

An explanation of the impossibility to detect malware perfectly including a dive into Fred Cohen's proof that virus detection is an ...

10:23
Malware Theory - Why There Is No Perfect Antivirus Scanner

6,082 views

7 years ago

DEFCONConference
DEF CON 24 - Stephan Huber and Siegfried Rasthofer - Smartphone Antivirus and Apps

Today's evil often comes in the form of ransomware, keyloggers, or spyware, against which AntiVirus applications are usually an ...

35:43
DEF CON 24 - Stephan Huber and Siegfried Rasthofer - Smartphone Antivirus and Apps

2,323 views

9 years ago

NorthSec
Malware Morphology for Detection Engineers

As Defenders it is easy to view attacker behavior through a Technique lens, but this perspective often causes us to forget about ...

2:47:25
Malware Morphology for Detection Engineers

2,559 views

Streamed 2 years ago

NorthSec
Kristina Balaam - Evading Vulnerability Exploitation Through Secure Android Development

The first commercially-available Android device was released in 2008. Despite its nearly 10-year public lifespan, the OS still ...

51:49
Kristina Balaam - Evading Vulnerability Exploitation Through Secure Android Development

826 views

7 years ago

0xdade
Deep Learning For Realtime Malware Detection - Domenic Puzio and Kate Highnam

Domain generation algorithm (DGA) malware makes callouts to unique web addresses to avoid detection by static rules engines.

46:14
Deep Learning For Realtime Malware Detection - Domenic Puzio and Kate Highnam

5,457 views

7 years ago

DEFCONConference
DEF CON 25 - Hyrum Anderson - Evading next gen AV using AI

... reinforcement learning to modify malware to evade machine learning malware detection. Reinforcement learning has produced ...

18:35
DEF CON 25 - Hyrum Anderson - Evading next gen AV using AI

4,822 views

8 years ago

BruCON Security Conference
16 - BruCON 0x0A - Hunting Android Malware: A novel runtime technique for identifying applications

In this research, we propose a novel technique to identify malicious Android applications through the use of analyzing the HEAP ...

34:48
16 - BruCON 0x0A - Hunting Android Malware: A novel runtime technique for identifying applications

578 views

7 years ago

DEFCONConference
DEF CON 21 - Ryan W Smith and Tim Strazzere - DragonLady An Investigation of SMS Fraud

This presentation will show key findings and methods of this investigation into top Android malware distributors operating in ...

40:29
DEF CON 21 - Ryan W Smith and Tim Strazzere - DragonLady An Investigation of SMS Fraud

1,584 views

12 years ago

DEFCONConference
DEF CON Safe Mode Demo Labs - Ajin Abraham - Mobile App Security Testing with MobSF

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware ...

30:37
DEF CON Safe Mode Demo Labs - Ajin Abraham - Mobile App Security Testing with MobSF

49,589 views

5 years ago