Loading…
This event has ended. Visit the official site or create your own event on Sched.
It is an annual, community-driven information security conference held in Prague. The event provides a platform for cybersecurity professionals, enthusiasts, and researchers to share knowledge, exchange ideas, and discuss the latest trends in the field. It’s a unique opportunity to connect with like-minded individuals, expand professional networks, and stay informed about the ever-evolving cybersecurity landscape.
More info at www.bsidesprg.cz

Tuesday April 21, 2026 09:00 - 11:30 CEST
Modern malware increasingly relies on autonomous execution logic rather than immediate payload execution. This workshop demonstrates how they perform inspection and delayed activation to evade dynamic analysis and endpoint protection (practical learning for offensive + defensive security engineers).

Overview
As endpoint detection, sandboxing, and behavioral monitoring mature, malware has increasingly shifted toward autonomous execution models. Rather than immediately performing network communication or malicious actions, many implants now embed logic that inspects the execution environment and defers activity until specific conditions are met.

This workshop examines the technical mechanisms behind dormant and conditionally executed malware behavior, focusing on how execution flow is gated by environmental signals rather than external commands.


Technical focus areas
Participants will work with controlled samples that demonstrate:
  • Environment inspection using operating system APIs (network availability, adapter state, DNS resolution, system uptime)
  • Conditional execution paths implemented through state machines and decision treesDelayed activation logic based on runtime conditions rather than timers alone
  • Why standard tools such as process monitors, network captures, and sandbox environments frequently observe no actionable behavior
  • How conditional execution impacts both red team validation and blue team detection strategies
Hands-on approach
The workshop is structured around practical analysis rather than exploitation. Attendees will trace execution paths, identify dormant branches, and observe how small environmental changes alter program behavior. All demonstrations are non-destructive and run in isolated lab environments.


Outcome
By the end of the session, participants will be able to recognize environment-aware execution patterns, understand why dormant malware often evades detection, and reason about how such behavior affects modern security testing and monitoring.

This is a technical, hands-on workshop focused on execution logic and control flow analysis.No ransomware, destructive payloads, or live command-and-control infrastructure are involved.All examples are self-contained and executed in isolated virtual environments.The workshop emphasizes system-level behavior, API usage, and execution gating rather than payload development.Attendees will need a laptop capable of running a preconfigured virtual machine (instructions provided in advance).Content is derived from real-world offensive security research and experience analyzing advanced execution-evasion techniques.

Speakers
avatar for Kashif Amanat

Kashif Amanat

Offensive Security Engineer
I’m a security practitioner with 9+ years of hands-on experience in offensive security and system-level security analysis. My work focuses on how systems behave in practice — from Windows internals and enterprise infrastructure to AI-driven systems and software-defined vehicl... Read More →
Tuesday April 21, 2026 09:00 - 11:30 CEST
Novotel - WR2 Kateřinská 38, Nové Město, 120 00 Praha-Praha 2, Czechia

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Share Modal

Share this link via

Or copy link