ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,100 results

Lawrence Systems
Digital Forensics: How Malware Can Hide In Plain Sight

Connecting With Us --------------------------------------------------- + Hire Us For A Project: https://lawrencesystems.com/hire-us/ + Tom ...

14:55
Digital Forensics: How Malware Can Hide In Plain Sight

11,354 views

5 years ago

BSidesLV
Defeating Machine Learning: Systemic Deficiencies for Detecting Malware

Defeating Machine Learning: Systemic Deficiencies for Detecting Malware - Wes Connell, Ryan Peters Ground Truth BSidesLV ...

45:14
Defeating Machine Learning: Systemic Deficiencies for Detecting Malware

2,067 views

9 years ago

Red Hat Enterprise Linux
Malware Detection with Red Hat Lightspeed | Red Hat Enterprise Linux Presents 55

The Red Hat® Lightspeed, formerly known as Red Hat Insights, malware detection service is a monitoring and assessment tool ...

56:09
Malware Detection with Red Hat Lightspeed | Red Hat Enterprise Linux Presents 55

1,285 views

Streamed 2 years ago

VideoLecturesChannel
Robust Android Malware Detection Against Adversarial Example Attacks

Authors: Heng Li, Shiyao Zhou, Wei Yuan, Xiapu Luo, Cuiying Gao, Shuiyan Chen.

7:57
Robust Android Malware Detection Against Adversarial Example Attacks

209 views

4 years ago

OWASP Foundation
Social Media Botnet Detection with Linkage Analysis and Machine Learning   Rundong Liu

Managed by the OWASP® Foundation https://owasp.org/

28:53
Social Media Botnet Detection with Linkage Analysis and Machine Learning Rundong Liu

412 views

4 years ago

NorthSec
NorthSec 2025 - Axelle Apvrille - Linux and IoT malware analysis with r2ai

A full malware analysis is quite long to perform. Depending on its complexity and the desired level of details, it takes between half ...

28:27
NorthSec 2025 - Axelle Apvrille - Linux and IoT malware analysis with r2ai

210 views

2 months ago

Budapest Hackerspace
Camp++ 0x7e4 // Malware analysis: Why and How - an introduction by a2b2c2

This talk was performed on 22 August 2020 at Camp++ 0x7e4, MP4 downloads and presentation slides are available at ...

57:38
Camp++ 0x7e4 // Malware analysis: Why and How - an introduction by a2b2c2

140 views

5 years ago

SerializingMe
Fumbling Around With Machine Learning and Malware Analysis

Decided to do something somewhat different and play around with machine learning using KNIME and focusing on how one goes ...

1:34:25
Fumbling Around With Machine Learning and Malware Analysis

80 views

6 years ago

CCS 2016
CCS 2016 - FeatureSmith: Automatically Engineering Features for Malware Detection

Title: FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature Authors: Ziyun ...

24:45
CCS 2016 - FeatureSmith: Automatically Engineering Features for Malware Detection

358 views

9 years ago

0xdade
Deep Learning For Realtime Malware Detection - Domenic Puzio and Kate Highnam

Domain generation algorithm (DGA) malware makes callouts to unique web addresses to avoid detection by static rules engines.

46:14
Deep Learning For Realtime Malware Detection - Domenic Puzio and Kate Highnam

5,457 views

7 years ago

Coleman Kane
CS6038 2020: Week 9 - Malware Detection and Identification with Yara

... malware samples it might. Beneficial to me to have a lot of the different rules I've been working with on the different projects I've ...

1:12:02
CS6038 2020: Week 9 - Malware Detection and Identification with Yara

1,144 views

5 years ago

MalwareAnalysisForHedgehogs
Ask An Analyst - How did I get Into Malware Analysis?

How I got into malware analysis and what disassemblers I recommend for a newbie 00:16 - How did you get into malware ...

6:57
Ask An Analyst - How did I get Into Malware Analysis?

11,108 views

8 years ago

DEFCONConference
DEF CON 30 Blue Team Village -Project Obsidian - REM Long Walks On The Beach Analyzing PowerShells

... the domain that the malware was calling out to was no longer containing uh whatever secondary malware piece there was and ...

43:28
DEF CON 30 Blue Team Village -Project Obsidian - REM Long Walks On The Beach Analyzing PowerShells

444 views

3 years ago

OWASP Foundation
Mark Graham - Cloud-based Detection Techniques for Botnets and Other Malware

From AppSecEU 2014 in Cambridge https://2014.appsec.eu/ Traditional techniques for detecting malware, such as viruses, ...

51:29
Mark Graham - Cloud-based Detection Techniques for Botnets and Other Malware

2,262 views

11 years ago

Canadian Institute for Cybersecurity (CIC)
Application of Deep Learning in Malware Detection and Classification by Samaneh Mahdavifar

A webinar on “Application of Deep Learning in Malware Detection and Classification” by Samaneh Mahdavifar, a Ph.D. student at ...

31:24
Application of Deep Learning in Malware Detection and Classification by Samaneh Mahdavifar

1,075 views

6 years ago

DEFCONConference
DEF CON 30 Blue Team Village - Project Obsidian - REM Phishing In The Morning - Abundance of Samples

All right and hello welcome to Blue Team Villages project obsidian reverse engineering malware station walkthrough this is ...

35:52
DEF CON 30 Blue Team Village - Project Obsidian - REM Phishing In The Morning - Abundance of Samples

635 views

3 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - 3CX SmoothOperator C2 extraction with x64dbg and CyberChef

To obtain more IoCs we analyse the second stage DLL that we decrypted in the first 3CX video. With IDA Free we determine the ...

45:37
Malware Analysis - 3CX SmoothOperator C2 extraction with x64dbg and CyberChef

1,477 views

2 years ago

MalwareAnalysisForHedgehogs
Book Review - Malware Analysis and Detection Engineering

My opinion about the book "Malware Analysis and Detection Engineering" by Abhijit Mohanta and Anoop Saldanha. Malware ...

14:54
Book Review - Malware Analysis and Detection Engineering

4,705 views

3 years ago

SpaceCoastSec
SWFLSec - September 2020 - Modern Malware: Detect, Analyze and Reverse

Josh Stroschein presents Modern Malware: Detect, Analyze and Reverse at SWFLSec's monthly meetup. Malware authors go to ...

2:04:35
SWFLSec - September 2020 - Modern Malware: Detect, Analyze and Reverse

233 views

5 years ago

BSides Belfast
Domhnall Carlin - Dynamic Analysis Of Malware Using Run time Opcodes

BSides Belfast 2016.

30:30
Domhnall Carlin - Dynamic Analysis Of Malware Using Run time Opcodes

141 views

8 years ago