Today, many vendors are developing sandboxes to help stem the rising tide of advanced threats. Many vendors claim they can a broad range of advanced attacks. But do they?
Not all sandboxes are built alike. In security, one way to gauge a solution’s efficacy is to look at evasion methods: How do attackers bypass a technology? In this talk, we explain four major methods for bypassing sandboxes along with 20+ sub categories of evasion methods. By going through a full spectrum, security teams can better assess sandbox technology – whether they’re buying for the first time or wondering if their current product is up to par.