ABOUT

Amanda Rousseau Malware Research Engineer @ Endgame, Inc.

Work Blogs

Instegogram: Leveraging Instagram for C2 via Image Steganography | Endgame

Your Package Has Been Successfully Encrypted: TeslaCrypt 4.1A and the Malware Attack Chain | Endgame

DOS AND DON’TS WITH DOCUMENT EMBEDDED OBJECTS | FireEye

MACROS GALORE | FireEye

A NOT-SO CIVIC DUTY: ASPROX BOTNET CAMPAIGN SPREADS COURT DATES AND MALWARE | FireEye

TARGETED ATTACK TREND ALERT: PLUGX THE OLD DOG WITH A NEW TRICK | FireEye

Whitepapers

DLL SIDE-LOADING:  A Thorn in the Side of  the Anti-Virus Industry | FireEye

Exploring Anti-forensic techniques used in HFS/HFS+ File systems | Johns Hopkins University

Malware Dynamic Behavior Classification: SVM-HMM applied to Malware API Sequencing | Johns Hopkins University

Conferences

WiCys Conference 2017 | Reverse Engineering Malware 101

BSides 2017 | .Net Hijacking to Defend Powershell

DefCon (Crypto Village) 2016 | Instegogram: Leveraging Instagram for C2 via Image Steganography

Mircon 2014 | OSX Malware: Plists, Shell Scripts, and Objective-C, Oh-My!

RSA Conference 2014 | DLL Side-Loading: A Thorn in the Side of the Anti-Virus (AV) Industry

DoD Cyber Crime Conference 2012  | Vehicle Embedded System Imaging & Extraction, Examination and Exploitation