Malware analysis

Results: 349



#Item
131Hashing / System software / Error detection and correction / Hash table / Hash function / Computer virus / Hash list / COM file / Ar / Computing / Search algorithms / Software

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS MAKING A HASH OF THINGS Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: vxheaven.org

Language: English - Date: 2009-09-01 15:48:44
132Opcode / MOV / JMP / Malware / Computing / Machine code / X86 instructions / NOP

Statistical Structures: Fingerprinting Malware for Classification and Analysis Daniel Bilar Wellesley College (Wellesley, MA) Colby College (Waterville, ME)

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
133Computer security / Malware / Rootkit / Microsoft Security Essentials / Computer virus / Keystroke logging / Antivirus software / System software / Cyberwarfare

Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis Heng Yin∗† Dawn Song‡∗ Manuel Egele, Christopher Kruegel, Engin Kirda§ {pizzaman,chri

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
134Cyberwarfare / Stack buffer overflow / Buffer overflow / Uncontrolled format string / Vulnerability / Valgrind / C / Malware / Pointer / Computing / Software bugs / Software engineering

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome Carnegie Mellon University Abstract

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:29
135Cross-platform software / Linux / Hacking / Malware / Firefox / Google Chrome / OpenSSL / Computer virus / Systemd / Software / Computing / Computing platforms

ANALYSIS NEWSANALYSIS The Linux Voice view on what’s going on in the world of Free Software. Opinion

Add to Reading List

Source URL: www.linuxvoice.com

Language: English - Date: 2015-04-09 09:48:24
136Malware / Avira / Computer virus / BitDefender / Trend Micro Internet Security / Antivirus software / System software / Software

Real World Protection Test in Detail AV-Comparatives’ Real-World Protection Test is currently the cutting edge when it comes to the analysis of antivirus products. Automation of the test process makes it possible to te

Add to Reading List

Source URL: www.av-comparatives.org

Language: English - Date: 2013-04-08 10:08:34
137Computer security / Network security / Malware / Surveillance / Threat / Unified threat management / Computer network security / Cyberwarfare / Security

Predict and Prevent Corporate Security Threats iboss Network Security Tracks Data Flow to Predict and Prevent Corporate Security Threats Advanced behavioral data analysis detects threats through anomalies in data movemen

Add to Reading List

Source URL: residential.iphantom.com

Language: English - Date: 2015-04-20 16:17:18
138Tree automaton / Malware / Tree / Directed acyclic graph / Graph coloring / Graph theory / Automata theory / Theoretical computer science

Malware Analysis with Tree Automata Inference ⋆ Domagoj Babi´c, Daniel Reynaud, and Dawn Song University of California, Berkeley {babic, reynaud, dawnsong}@cs.berkeley.edu Abstract. The underground malware-based econ

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
139Cognition / Ethology / Malware / Analysis / Science

Malware Analysis, Software Obfuscation and the Ethics of Large Scale Malware Evaluation SBA Research & Vienna University of Technology Edgar R. Weippl

Add to Reading List

Source URL: www.nii.ac.jp

Language: English - Date: 2014-02-14 02:22:27
UPDATE