tamyahuNe2
Highest Rated Comments
tamyahuNe22 karma
Hi,
1) I would like to ask, if you are working on the prevention against Intel AMT rootkits that reside outside of the operating system, inside of the firmware of the hardware in a computer. Is there any prevention against such attacks?
An example of such rootkit was presented in this talk:
Persistent, Stealthy, Remote-controlled Dedicated Hardware Malware [30c3]
2) How much did polymorphic malware evolve since the early beginnings? Is it much harder to detect such malware today? What kind of techniques does such malware use?
3) Could you comment on the Project Zero findings of the problems with unpacking of the executables?
Thank you.
PS: I love reading your malware reports and your work in general <3
tamyahuNe25 karma
Do you plan to visit other post-Soviet countries apart from Prague?
View HistoryShare Link