* Faculty       * Staff       * Students & Alumni       * Committees       * Contact       * Institute Directory
* Undergraduate Program       * Graduate Program       * Courses       * Institute Catalog      
* Undergraduate       * Graduate       * Institute Admissions: Undergraduate | Graduate      
* Colloquia       * Seminars       * News       * Events       * Institute Events      
* Overview       * Lab Manual       * Institute Computing      
No Menu Selected

* News


Project Sauron: Analyzing the sophisticated and not-so-sophisticated malware components through the eyes of security professionals

Speaker: Grant Hollis
Lockheed Martin, Arlington, VA

December 9, 2016 - 1 p.m. to 2 p.m.
Location: SAGE 3704
Hosted By: Prof. Vassilis Zikas(x2609)


Recently Kaspersky and Symantec released reports on an advanced backdoor that they found all over Russia, China, Iran, and other countries. This malware had some new advanced capabilities that allowed it to exfiltrate data over air-gaps, steal passwords in novel ways, and communicate with the outside work. The malware seems to have been in use for the past five years. In this talk I will describe Project Sauron and what makes it unique, describe some of the challenges of reversing it, and discuss the implications will be for malware authors moving forward.


Grant Hollis is a Lead Software Engineer and Security Researcher at Lockheed Martin's Advanced Technology Laboratories (LM ATL) in Arlington, VA with interests in network security and reverse engineering. He has been leading software development contracts for the past 12 years. He also teaches internal training classes on reverse engineering and vulnerability research.

Last updated: December 2, 2016