Malware analysis

Results: 349



#Item
281Cyberwarfare / Computer network security / Risk analysis / IT risk / Information security / Data breach / Security controls / Malware / Identity theft / Security / Computer security / Data security

OFFICE OF THE STATE CONTROLLER

Add to Reading List

Source URL: qa.osc.nc.gov

Language: English - Date: 2014-05-06 14:20:13
282Multi-agent systems / Internet / Domain name system / Botnet / Spam filtering / Malware / Dynamic DNS / DNSBL / Spamming / Computer network security / Computing

Internet Monitoring via DNS Traffic Analysis Wenke Lee Georgia Institute of Technology 0

Add to Reading List

Source URL: www.cyber.umd.edu

Language: English - Date: 2012-11-19 10:50:45
283File sharing / Internet / Internet security / Computing / Computer network security / Malware / Fast flux

Large-Scale Analysis of Malware Downloaders Christian Rossow †‡? , Christian Dietrich †¶, and Herbert Bos‡ †University of Applied Sciences Gelsenkirchen, Institute for Internet Security, Germany ‡VU Universi

Add to Reading List

Source URL: www.christian-rossow.de

Language: English - Date: 2012-05-03 09:12:16
284Concurrent computing / Computer network security / File sharing networks / Internet protocols / Spamming / Malware / OpenDNS / Fast flux / Content delivery network / Computing / Domain name system / Internet

Sandnet: Network Traffic Analysis of Malicious Software Christian Rossow1,2 , Christian J. Dietrich1,3 , Herbert Bos2 , Lorenzo Cavallaro2 , Maarten van Steen2 , Felix C. Freiling3 , Norbert Pohlmann1 1 Institute for In

Add to Reading List

Source URL: www.christian-rossow.de

Language: English - Date: 2011-05-06 02:17:27
285Software bugs / Address space layout randomization / PaX / Buffer overflow / Return-oriented programming / Malware / C / Stack / Pointer / Computing / Computer programming / Software engineering

Systematic Analysis of Defenses Against Return-Oriented Programming ⋆ R. Skowyra, K. Casteel, H. Okhravi, N. Zeldovich, and W. Streilein Boston University, MIT Lincoln Laboratory, and MIT CSAIL Abstract. Since the int

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
286Malware / Zeus / Citadel / Portable Executable / Hooking / Dropper / System software / Software / Computing

Malware Analysis: Citadel[removed]AhnLab ASEC (AhnLab Security Emergency response Center) Analysis Team The following is a detailed analysis report of the malware Citadel. As with similar malware such as Zeus and

Add to Reading List

Source URL: seifreed.es

Language: English - Date: 2013-01-18 05:27:20
287Code Red / Computer virus / Witty / Morris worm / Malware / SQL Slammer / Parasitic worm / Ice / Failure / Computer worms / Cyberwarfare / Computer security

Worm Evolution Tracking via Timing Analysis Moheeb Abu Rajab Fabian Monrose Andreas Terzis Computer Science Department Johns Hopkins University {moheeb,fabian,terzis}@cs.jhu.edu

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:37
288Shellcode / Malware / Software bugs / Hooking / Polymorphic code / Windows API / Code injection / Exploit / Application programming interface / Cyberwarfare / Computer security / Computing

Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow Fabian Monrose

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2012-08-20 18:04:07
289Central processing unit / Hardware virtualization / QEMU / X86 architecture / Emulator / Instruction set / VMware / Hypervisor / Ring / System software / Software / Virtual machines

Detecting System Emulators Thomas Raffetseder, Christopher Kruegel, and Engin Kirda⋆ Secure Systems Lab, Technical University of Vienna, Austria {tr,chris,ek}@seclab.tuwien.ac.at Abstract. Malware analysis is the proc

Add to Reading List

Source URL: www.seclab.tuwien.ac.at

Language: English - Date: 2007-07-12 08:34:46
290Computer crimes / Malware / Computer security / Computer network security / Antivirus software / Phishing / Rootkit / Advanced persistent threat / Near field communication / Cybercrime / Espionage / Cyberwarfare

Multi-State Information Sharing and Analysis Center Monthly Security Tips NEWSLETTER   January 2013  

Add to Reading List

Source URL: www.maine.gov

Language: English - Date: 2013-10-01 08:57:30
UPDATE