COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
FluBotAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Matthew Ireland. A new strain of Android malware hit the stage in 2021; known as FluBot, it uses an overlay attack to impersonate banking apps in order to steal users’ credentials. What makes this malware stand out is its range of countermeasures which harden it against detection, analysis and mitigation. In this talk I will explain the operation of FluBot’s client, protocol and backend infrastructure. This talk is part of the Churchill CompSci Talks series. This talk is included in these lists:Note that ex-directory lists are not shown. |
Other listsARClub Talks BCNI seminars Consciously DigitalOther talksStochastic representation of processes with resetting Network science and network medicine: New strategies for understanding and treating the biological basis of mental ill-health Inferring universal properties of critical fields from dragged colloids Non-local birth-death processes Kolmogorov's dissipation wavenumber and determining wavenumber |