Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the growing threat of Go-based malware in IoT environments through this 48-minute DEF CON 33 conference talk. Discover why Go malware presents unique challenges for security analysts and defenders, from its large statically compiled binaries to unfamiliar runtime structures that confound traditional analysis tools. Learn practical techniques and tools for effectively reversing Go malware, including methods to recover types, strings, and function information from obfuscated binaries. Examine the real-world case study of Pumabot, a Go-based botnet specifically targeting IoT surveillance devices, analyzing its operational mechanisms, target selection, and forensic artifacts. Gain insights into why attackers increasingly favor Go for malware development due to its cross-compilation flexibility, and understand how detection systems struggle to keep pace with these evolving threats. Master essential skills for identifying, analyzing, and defending against Go malware in IoT ecosystems, preparing you to handle similar threats in your security analysis workflow.
Syllabus
DEF CON 33 - Go Malware Meets IoT - Challenges, Blind Spots, and Botnets - Asher Davila
Taught by
DEFCONConference