Malware analysis

Results: 349



#Item
21Malware / Computing / Computer network security / Multi-agent systems / Spamming / Cyberwarfare / Computer security / Malware analysis / Botnet

Impeding Automated Malware Analysis Paul Royal College of Computing Georgia Institute of Technology

Add to Reading List

Source URL: countermeasure2012.com

Language: English - Date: 2012-11-01 08:16:33
22Cyberwarfare / Computer security / Computing / Malware / Computer network security / Multi-agent systems / Spamming / Malware analysis / Antivirus software / Computer virus / Rootkit / Botnet

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:17:19
23Cyberwarfare / Computing / Security / Hacking / Computer network security / Malware / Server / Computer security / CSC Version 6.0 / Cyber-collection

THE PROJECTSAURON APT Global Research and Analysis Team VersionAugust 9, 2016) The ProjectSauron APT

Add to Reading List

Source URL: cdn.securelist.com

Language: English - Date: 2016-08-09 10:39:42
24Computing / Computer security / Cyberwarfare / Spyware / Mobile Malware / Hummingbad / Android / Google Play / Malware / Rootkit

From HummingBad to Worse NEW DETAILS AND AN IN-DEPTH ANALYSIS OF THE HUMMINGBAD ANDROID MALWARE CAMPAIGN For five months, Check Point mobile threat researchers had unprecedented, behind-thescenes access to a group of cyb

Add to Reading List

Source URL: blog.checkpoint.com

Language: English - Date: 2016-07-01 12:40:55
25Software engineering / Computing / Computer programming / Cross-platform software / Object-oriented programming languages / Procedural programming languages / Concurrent programming languages / Program analysis / Program slicing / Android / Java / Subroutine

Technical Report Nr. TUD-CSFeb. 5th, 2015 Harvesting Runtime Data in Android Applications for Identifying Malware and

Add to Reading List

Source URL: www.bodden.de

Language: English - Date: 2015-02-10 01:12:58
26Information science / Information retrieval / Hashing / Information / Search algorithms / Jaccard index / Malware analysis / Malware / Locality-sensitive hashing / Cluster analysis / Hash function / Hierarchical clustering

BitShred: Feature Hashing Malware for Scalable Triage and Semantic Analysis Jiyong Jang David Brumley

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
27Error detection and correction / Hashing / Cryptographic hash functions / Search algorithms / Malware / Malware analysis / Computer virus / Antivirus software / Hash function / MD5 / Hash list / Crypt

Proceedings Template - WORD

Add to Reading List

Source URL: womencourage.acm.org

Language: English - Date: 2016-08-09 09:13:52
28DLL injection / CrowdStrike / Shellcode / Rootkit / Hooking / Malware

ANTI-INCIDENT RESPONSE Nick Harbour, Principal Consultant © 2012 CrowdStrike, Inc. All rights reserved. Nick Harbour - Bio • 14 Years of Intrusion Analysis

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2012-06-29 08:39:58
29Malware / Malware analysis / Intelligence analysis

Four years of practical information sharing MISP - Malware Information Sharing Platform & Threat Sharing Alexandre Dulaunoy Andras Iklody - TLP:WHITE February 25, 2016

Add to Reading List

Source URL: www.circl.lu

Language: English - Date: 2016-02-25 09:57:44
30Domain name system / Cyberwarfare / Malware / Computer network security / Internet protocols / Malware analysis / Botnet / OpenDNS / Name server / Denial-of-service attack / Root name server / Payload

Sandnet: Network Traffic Analysis of Malicious Software Christian Rossow1,2 , Christian J. Dietrich1,3 , Herbert Bos2 , Lorenzo Cavallaro2 , Maarten van Steen2 , Felix C. Freiling3 , Norbert Pohlmann1 1 Institute for In

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-12-21 09:55:27
UPDATE