Oak Ridge, Tennessee     April 7-9, 2015

Registration & Lodging Information

Early registration is available thru March 20, 2015


Hyperion Hands-on Tutorial Registration:

What is Hyperion?

Hyperion is a semi-automated software behavior computation system for detecting sleeper code, software vulnerabilities, malware analysis, and reverse engineering.

How does Hyperion work?

Binary software is extracted directly from a device of interest. A model of the processor provides functional semantics for every machine-level instruction. Instructions are disassembled, mapped to their functional semantics, and the entire program is converted to a structured program. End-to-end functionality is computed for every structure, resulting in a complete behavior catalog for the program that can be both automatically and manually inspected to determine specific properties.

Embedded malware may be obfuscated in a variety of ways, and triggered by obscure conditions. The functionality of this malware, however, must remain unchanged by the obfuscation process, or it will not accomplish its mission. The Hyperion system reasons about functionality, no matter how it is realized in terms of program instructions. Unusually complex conditions and suspicious behavior signatures are used to automatically detect potential bad behavior. For any critical device action, the system can generate a complete set of conditions, expected or unexpected, that lead to that action. This set of conditions can be checked for known bad signatures, and then inspected by domain experts to assure correct operation. We believe it holds considerable promise for rapid comprehensive analysis of software with mathematical certainty, including insuring that critical systems are free of vulnerabilities and sleeper code and rapid reverse engineering of software for both offensive and defensive purposes.

You will learn:

How to use Hyperion to analyze Malware

Who Should Attend the Class:

Beginner to intermediate malware analysts, information security professionals, forensic investigators, and others requiring an understanding of how to overcome difficult challenges in malware analysis.

1.2 What You Will Get

1.3 Prerequisites