Malware analysis

Results: 349



#Item
21Impeding Automated Malware Analysis Paul Royal College of Computing Georgia Institute of Technology

Impeding Automated Malware Analysis Paul Royal College of Computing Georgia Institute of Technology

Add to Reading List

Source URL: countermeasure2012.com

Language: English - Date: 2012-11-01 08:16:33
22Prudent Practices for Designing Malware Experiments: Status Quo and Outlook

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:17:19
23THE PROJECTSAURON APT Global Research and Analysis Team VersionAugust 9, 2016) The ProjectSauron APT

THE PROJECTSAURON APT Global Research and Analysis Team VersionAugust 9, 2016) The ProjectSauron APT

Add to Reading List

Source URL: cdn.securelist.com

Language: English - Date: 2016-08-09 10:39:42
24From HummingBad to Worse NEW DETAILS AND AN IN-DEPTH ANALYSIS OF THE HUMMINGBAD ANDROID MALWARE CAMPAIGN For five months, Check Point mobile threat researchers had unprecedented, behind-thescenes access to a group of cyb

From HummingBad to Worse NEW DETAILS AND AN IN-DEPTH ANALYSIS OF THE HUMMINGBAD ANDROID MALWARE CAMPAIGN For five months, Check Point mobile threat researchers had unprecedented, behind-thescenes access to a group of cyb

Add to Reading List

Source URL: blog.checkpoint.com

Language: English - Date: 2016-07-01 12:40:55
25Technical Report Nr. TUD-CSFeb. 5th, 2015 Harvesting Runtime Data in Android Applications for Identifying Malware and

Technical Report Nr. TUD-CSFeb. 5th, 2015 Harvesting Runtime Data in Android Applications for Identifying Malware and

Add to Reading List

Source URL: www.bodden.de

Language: English - Date: 2015-02-10 01:12:58
26BitShred: Feature Hashing Malware for Scalable Triage and Semantic Analysis Jiyong Jang David Brumley

BitShred: Feature Hashing Malware for Scalable Triage and Semantic Analysis Jiyong Jang David Brumley

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
27Proceedings Template - WORD

Proceedings Template - WORD

Add to Reading List

Source URL: womencourage.acm.org

Language: English - Date: 2016-08-09 09:13:52
28ANTI-INCIDENT RESPONSE Nick Harbour, Principal Consultant © 2012 CrowdStrike, Inc. All rights reserved. Nick Harbour - Bio • 14 Years of Intrusion Analysis

ANTI-INCIDENT RESPONSE Nick Harbour, Principal Consultant © 2012 CrowdStrike, Inc. All rights reserved. Nick Harbour - Bio • 14 Years of Intrusion Analysis

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2012-06-29 08:39:58
29Four years of practical information sharing MISP - Malware Information Sharing Platform & Threat Sharing Alexandre Dulaunoy Andras Iklody - TLP:WHITE  February 25, 2016

Four years of practical information sharing MISP - Malware Information Sharing Platform & Threat Sharing Alexandre Dulaunoy Andras Iklody - TLP:WHITE February 25, 2016

Add to Reading List

Source URL: www.circl.lu

Language: English - Date: 2016-02-25 09:57:44
30Sandnet: Network Traffic Analysis of Malicious Software Christian Rossow1,2 , Christian J. Dietrich1,3 , Herbert Bos2 , Lorenzo Cavallaro2 , Maarten van Steen2 , Felix C. Freiling3 , Norbert Pohlmann1 1  Institute for In

Sandnet: Network Traffic Analysis of Malicious Software Christian Rossow1,2 , Christian J. Dietrich1,3 , Herbert Bos2 , Lorenzo Cavallaro2 , Maarten van Steen2 , Felix C. Freiling3 , Norbert Pohlmann1 1 Institute for In

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-12-21 09:55:27