Malware analysis

Results: 349



#Item
31Public document  APT1: technical backstage malware analysis

Public document APT1: technical backstage malware analysis

Add to Reading List

Source URL: malware.lu

Language: English - Date: 2015-06-18 15:20:55
32IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware Michelle Y. Wong and David Lie Department of Electrical and Computer Engineering University of Toronto

IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware Michelle Y. Wong and David Lie Department of Electrical and Computer Engineering University of Toronto

Add to Reading List

Source URL: www.eecg.toronto.edu

Language: English - Date: 2015-12-20 13:29:40
33Job vacancy  itrust consulting s.à r.l. N. réf : MALWARE ANALYST_V1.1.DOC

Job vacancy itrust consulting s.à r.l. N. réf : MALWARE ANALYST_V1.1.DOC

Add to Reading List

Source URL: www.itrust.lu

Language: English - Date: 2015-01-24 19:25:20
34Ransomware phenomenon Extortion scheme Archetype of modern malware Conclusion  Comparative analysis of various ransomware virii

Ransomware phenomenon Extortion scheme Archetype of modern malware Conclusion Comparative analysis of various ransomware virii

Add to Reading List

Source URL: esec-lab.sogeti.com

Language: English - Date: 2016-07-01 12:08:46
35April 2015 Feature Article: Emerging Malware Table of Contents Emerging Malware ...........................................................................................................................................

April 2015 Feature Article: Emerging Malware Table of Contents Emerging Malware ...........................................................................................................................................

Add to Reading List

Source URL: virusradar.com

Language: English - Date: 2015-06-02 03:02:53
36Malware Dynamic Analysis Part 1 Veronica Kovah vkovah.ost at gmail

Malware Dynamic Analysis Part 1 Veronica Kovah vkovah.ost at gmail

Add to Reading List

Source URL: opensecuritytraining.info

Language: English - Date: 2015-10-04 21:23:17
37Malware Dynamic Analysis Part 3 Veronica Kovah vkovah.ost at gmail  All materials is licensed under a Creative

Malware Dynamic Analysis Part 3 Veronica Kovah vkovah.ost at gmail All materials is licensed under a Creative

Add to Reading List

Source URL: opensecuritytraining.info

Language: English - Date: 2015-10-04 21:23:23
38malWASH: Washing malware to evade dynamic analysis Kyriakos K. Ispoglou Purdue University Abstract Hiding malware processes from fingerprinting is challenging. Current techniques like metamorphic algorithms and diversity

malWASH: Washing malware to evade dynamic analysis Kyriakos K. Ispoglou Purdue University Abstract Hiding malware processes from fingerprinting is challenging. Current techniques like metamorphic algorithms and diversity

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-08-18 12:54:16
39IDC Herzliya Efi Arazi School of Computer Science MSc in Computer Science Kuluoz: Malware and botnet analysis

IDC Herzliya Efi Arazi School of Computer Science MSc in Computer Science Kuluoz: Malware and botnet analysis

Add to Reading List

Source URL: portal.idc.ac.il

Language: English - Date: 2013-11-21 04:26:41
    40Embracing the new threat: towards automatically, self-diversifying malware Mathias Payer <> UC Berkeley and (soon) Purdue University

    Embracing the new threat: towards automatically, self-diversifying malware Mathias Payer <> UC Berkeley and (soon) Purdue University

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40