Wednesday, March 16, 2022
Online, video conference

Speaker: Antonio Villani, Senior Cybersecurity Architect at Leonardo's Cybersecurity Division. 

Affiliation: Leonardo S.p.A's Cybersecurity Division.

Summary: In this seminar, we will unveil some basic malware reverse-engineering techniques and we will understand why this discipline is still considered of cumbersome importance by security vendors and threat intelligence practitioners.

After a short introduction, we will go straight to the point, and we will talk about binary analysis and executable file formats for both Windows and Linux operating systems. During the discussion, we will describe the techniques and tools that may help the reverser to find its way through simple binaries or to automate part of the analysis. In the final part of the talk, we will also scratch the surface of software obfuscation to understand how miscreants can circumvent analysis tools making the life of the reverser harder.

Biography: Antonio Villani spent the past years analyzing high-level implants for top-tier customers, providing detailed implementation information to support cyber-defense and cyber threat intelligence teams. Now he works for Leonardo Cybersecurity Division where he uses his experience in the reverse-engineering of multi-stage implants to improve detection and response capabilities of endpoint security products. He is the co-author of the training named Modern Malware Opsec & Anti-Reverse Techniques Implementation and Reversing that has been given within the OffensiveCon conference of 2022 in Berlin. As a researcher, he published in top-tier conferences and journals and he participated in European research projects in the field of cyber resilience and data security. During his Ph.D., he also worked in the field of malware research and digital forensics.

Registration:  Participation is free. However, registration is required on Eventbrite at the following link:
'Malware reverse engineering: foundations'