The document discusses a master's thesis by Fabio Rosato focused on countering sandbox evasion techniques used by malware through symbolic execution. It categorizes malware evasion techniques, evaluates the performance of tools like angr and paranoid fish, and highlights the importance of symbolic execution in identifying malicious behavior that evades detection. Contributions include a high-level categorization of evasive techniques and a study of Windows API interaction patterns related to malware detection.
Related topics: