Malware analysis

Results: 349



#Item
41

A Unique Approach to Threat Analysis Mapping: A Malware-Centric Methodology

Add to Reading List

Source URL: resources.sei.cmu.edu

Language: English - Date: 2016-04-19 12:54:44
    42Computer programming / Software engineering / Software / Debuggers / Debugging / Disassembler / GNU Debugger / WinDbg / Breakpoint / OllyDbg / D / Malware analysis

      Mitchell Adair

    Add to Reading List

    Source URL: www.cs.fsu.edu

    Language: English - Date: 2013-01-23 15:49:20
    43Malware / Computer network security / Antivirus software / Computer virus / Intrusion detection system / Avira / Malware analysis / Malware research

    SyScan’14, April 2–4, 2014, Singapore, Singapore Embracing the new threat: towards automatically, self-diversifying malware Mathias Payer

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    44Malware / Malware analysis / Cyberwarfare / Computer viruses / Carding / Computer security

    Characterizing Malware with MAEC and STIX v1.0 April 21st, 2014 Introduction This document describes the use of the Malware Attribute Enumeration and Characterization (MAEC)

    Add to Reading List

    Source URL: maecproject.github.io

    Language: English - Date: 2016-06-15 18:10:07
    45

    Scalable Traffic Dependence Analysis for Detecting Android Malware Activities∗ Hao Zhang, Danfeng (Daphne) Yao, and Naren Ramakrishnan Department of Computer Science, Virginia Tech Blacksburg, VA, USA {haozhang, danfen

    Add to Reading List

    Source URL: www-bcf.usc.edu

    Language: English - Date: 2015-10-14 16:54:25
      46Systematic review / Cyberwarfare / Computer network security / Qualitative research / Meta-analysis / Computer security / Bias / Exploratory research / Publication bias / Trustwave Holdings / Malware

      COLUMNS Exploring with a Purpose D A N G E E R A N D J AY J A C O B S Dan Geer is the CISO for In-QTel and a security researcher with a quantitative bent. He has

      Add to Reading List

      Source URL: www.usenix.org

      Language: English - Date: 2016-02-20 09:35:48
      47Computing / Computer network security / Multi-agent systems / Spamming / Concurrent computing / Cyberwarfare / Botnet / Distributed computing / Computer virus / Malware / Algorithmic trading / Antivirus software

      BOT-TREK CYBER INTELLIGENCE ci.group-ib.com GROUP-IB REPORT: ANALYSIS OF ATTACKS AGAINST TRADING AND BANK CARD

      Add to Reading List

      Source URL: www.group-ib.ru

      Language: English - Date: 2016-02-08 03:52:06
      48Ransomware / Cyberwarfare / Computer security / Security engineering / Malware / Malvertising

      LUCRATIVE RANSOMWARE ATTACKS: Analysis of the CryptoWall Version 3 Threat EXECUTIVE SUMMARY The Cyber Threat Alliance (CTA) is a group of leading cybersecurity solution providers who have joined

      Add to Reading List

      Source URL: cyberthreatalliance.org

      Language: English - Date: 2015-10-30 18:02:03
      49

      1 Enhancing Automated Malware Analysis Machines with Memory Analysis Tomer Teller, Adi Hayon Security Innovation Group

      Add to Reading List

      Source URL: www.blackhat.com

      Language: English - Date: 2015-05-28 15:50:59
        UPDATE