Hot Knives Through Butter: Evading File-Based Sandboxes

Hot Knives Through Butter: Evading File-Based Sandboxes

Cover

To combat today’s advanced threats, many IT departments are turning to file sandboxing, which allows you to spot malicious code via isolated, virtual environments. But by itself, this solution can only monitor and report on file activity, not analyze it. And the analysis IT professionals must perform is getting harder every day due to a range of sandbox-evasion techniques.

This in-depth guide explores this security challenge and gives you detailed information on each common evasion technique. Read on to learn how to detect these evasion strategies and to prevent them from compromising your security.  

Vendor:
FireEye
Posted:
04 Mar 2014
Published:
28 Feb 2014
Format:
PDF
Length:
21 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.