Malware analysis

Results: 349



#Item
31Computer network security / E-commerce / Secure communication / Malware / OpenSSL / Password / Computer security / Ver / Microsoft Windows

Public document APT1: technical backstage malware analysis

Add to Reading List

Source URL: malware.lu

Language: English - Date: 2015-06-18 15:20:55
32Smartphones / Cross-platform software / Object-oriented programming languages / Malware / Malware analysis / Android / Monkey X / Application programming interface / Concolic testing / Event / Java / Constraint satisfaction problem

IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware Michelle Y. Wong and David Lie Department of Electrical and Computer Engineering University of Toronto

Add to Reading List

Source URL: www.eecg.toronto.edu

Language: English - Date: 2015-12-20 13:29:40
33Malware / Malware analysis / OllyDbg / Volatility

Job vacancy itrust consulting s.à r.l. N. réf : MALWARE ANALYST_V1.1.DOC

Add to Reading List

Source URL: www.itrust.lu

Language: English - Date: 2015-01-24 19:25:20
34Trojan horses / Ransomware / Cryptovirology / Archiveus / PGPCoder / Malware / AIDS / Computer virus / Extortion / Plural form of words ending in -us

Ransomware phenomenon Extortion scheme Archetype of modern malware Conclusion Comparative analysis of various ransomware virii

Add to Reading List

Source URL: esec-lab.sogeti.com

Language: English - Date: 2016-07-01 12:08:46
35Antivirus software / ESET / Malware / Computer virus / David Harley / Rootkit / Trojan horses / ESET NOD32 / Malware analysis

April 2015 Feature Article: Emerging Malware Table of Contents Emerging Malware ...........................................................................................................................................

Add to Reading List

Source URL: virusradar.com

Language: English - Date: 2015-06-02 03:02:53
36Malware / Malware analysis / Cyberwarfare

Malware Dynamic Analysis Part 1 Veronica Kovah vkovah.ost at gmail

Add to Reading List

Source URL: opensecuritytraining.info

Language: English - Date: 2015-10-04 21:23:17
37Cyberwarfare / Rootkits / Malware analysis / Malware / Keystroke logging / Greg Hoglund / The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System

Malware Dynamic Analysis Part 3 Veronica Kovah vkovah.ost at gmail All materials is licensed under a Creative

Add to Reading List

Source URL: opensecuritytraining.info

Language: English - Date: 2015-10-04 21:23:23
38Emulator / Binary translation / Malware / Sandbox / Assembly language / Antivirus software / Terminal emulator / Unix signal / Computer virus / Kernel / System call / Dynamic recompilation

malWASH: Washing malware to evade dynamic analysis Kyriakos K. Ispoglou Purdue University Abstract Hiding malware processes from fingerprinting is challenging. Current techniques like metamorphic algorithms and diversity

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-08-18 12:54:16
39

IDC Herzliya Efi Arazi School of Computer Science MSc in Computer Science Kuluoz: Malware and botnet analysis

Add to Reading List

Source URL: portal.idc.ac.il

Language: English - Date: 2013-11-21 04:26:41
    40Cyberwarfare / Malware / Computer viruses / Computer security / Carding / Malware analysis

    Embracing the new threat: towards automatically, self-diversifying malware Mathias Payer <> UC Berkeley and (soon) Purdue University

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    UPDATE