Personal Information
Entreprise/Lieu de travail
Moscow, Russian Federation Russian Federation
Profession
Security Researcher
Secteur d’activité
Electronics / Computer Hardware
Site Web
sites.google.com/site/igorkorkin
À propos
An expert in digital security, full of passion and curiosity, I have ambitions to improve anti-malware protection systems utilizing machine learning techniques and to hunt zero-day exploits. Cybersecurity is my life: my job, and also my hobby and lifestyle. My areas of expertise are kernel mode rootkits detection, Windows internals, and hardware virtualization technologies (Intel VT-x, EPT, PT).
I have published more than 20 research papers; six recent papers are double-blind peer-reviewed, see my blog - igorkorkin.blogspot.com.
Mots-clés
windows kernel
memory protection
memory isolation
kernel integrity
hypervisor
rootkit detection
rootkits
linux passwords
memory forensics
mimipy
mimipenguin
protected process light
memoryranger
kernel data protection
hijacking attacks on memory
hypervisor-based protection
blackhat
bheu
cnc
stuxnet
dynamically allocated memory
information leakage
tracking memory access
anti-forensics
scattered fragments
memory analysis
anticipatory enhancement
cuda
instruction execution time
nested hypervisors
hypervisor threat
statistics and data analysis
blue pill
rootkit hypervisor
rpi
rating point inspection
processes detectio
drivers detection
probabilistic search
dbs
weight matrix
dynamic bit signature
pattern recognition problem
hardware virtualization
vmbr
stealth malware detection system
rootkit
bios
Tout plus
Présentations
(12)J’aime
(11)BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat Security Conference
•
il y a 5 ans
VXCON 2017
Kelvin Chan
•
il y a 6 ans
Hybis: Advanced Introspection for Effective Windows Guest Protection
Federico Franzoni
•
il y a 6 ans
Internet of Medical Things: Technological Environment of Personalized/ Precision Medicine
Alexandre Prozoroff
•
il y a 8 ans
Pitfalls of virtual machine introspection on modern hardware
Tamas K Lengyel
•
il y a 9 ans
CrySys guest-lecture: Virtual machine introspection on modern hardware
Tamas K Lengyel
•
il y a 9 ans
Detecting Evasive Malware in Sandbox
Rahul Mohandas
•
il y a 9 ans
31c3 Presentation - Virtual Machine Introspection
Tamas K Lengyel
•
il y a 9 ans
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspection and Stealth Breakpoints (IWSEC2014)
Kuniyasu Suzaki
•
il y a 9 ans
Stealthy, Hypervisor-based Malware Analysis
Tamas K Lengyel
•
il y a 8 ans
Cyber Security in Transportation
Oren Elimelech
•
il y a 8 ans
Personal Information
Entreprise/Lieu de travail
Moscow, Russian Federation Russian Federation
Profession
Security Researcher
Secteur d’activité
Electronics / Computer Hardware
Site Web
sites.google.com/site/igorkorkin
À propos
An expert in digital security, full of passion and curiosity, I have ambitions to improve anti-malware protection systems utilizing machine learning techniques and to hunt zero-day exploits. Cybersecurity is my life: my job, and also my hobby and lifestyle. My areas of expertise are kernel mode rootkits detection, Windows internals, and hardware virtualization technologies (Intel VT-x, EPT, PT).
I have published more than 20 research papers; six recent papers are double-blind peer-reviewed, see my blog - igorkorkin.blogspot.com.
Mots-clés
windows kernel
memory protection
memory isolation
kernel integrity
hypervisor
rootkit detection
rootkits
linux passwords
memory forensics
mimipy
mimipenguin
protected process light
memoryranger
kernel data protection
hijacking attacks on memory
hypervisor-based protection
blackhat
bheu
cnc
stuxnet
dynamically allocated memory
information leakage
tracking memory access
anti-forensics
scattered fragments
memory analysis
anticipatory enhancement
cuda
instruction execution time
nested hypervisors
hypervisor threat
statistics and data analysis
blue pill
rootkit hypervisor
rpi
rating point inspection
processes detectio
drivers detection
probabilistic search
dbs
weight matrix
dynamic bit signature
pattern recognition problem
hardware virtualization
vmbr
stealth malware detection system
rootkit
bios
Tout plus