У нас вы можете посмотреть бесплатно Inside Akira, ransomware's Rust experiment — Ben Herzog, Check Point или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Inside Akira, ransomware's Rust experiment Presented at the VB2025 conference in Berlin, 24 - 26 September 2025. ↓ Slides: N/A ↓ Paper: https://www.virusbulletin.com/uploads... → Details: https://www.virusbulletin.com/confere... ✪ PRESENTED BY ✪ • Ben Herzog (Check Point Software Technologies) ✪ ABSTRACT ✪ Rust binaries are notoriously resistant to "full RE" that maps the binary functionality end to end. In this research, we do just that – analysing "Akira v2", a Rust-based encryptor circulated by the prolific Akira RaaS group in early 2024. We work through the binary's opaque, sometimes barely documented, built-in types; its aggressively recursive in-lining of library code; and other "surprises" prepared for us by the Rust compiler. We explain in detail how we approached all these obstacles, and how one can methodically cross-reference Rust docs and idioms to understand code that would otherwise be impenetrable. We lay out the binary's structure, control flow, and even some of the original author's design process – and we see how all these factors translate into assembly, sometimes in surprising ways.