Malware analysis

Results: 349



#Item
41A Unique Approach to Threat Analysis Mapping: A Malware-Centric Methodology

A Unique Approach to Threat Analysis Mapping: A Malware-Centric Methodology

Add to Reading List

Source URL: resources.sei.cmu.edu

Language: English - Date: 2016-04-19 12:54:44
    42   Mitchell Adair

      Mitchell Adair

    Add to Reading List

    Source URL: www.cs.fsu.edu

    Language: English - Date: 2013-01-23 15:49:20
    43SyScan’14, April 2–4, 2014, Singapore, Singapore  Embracing the new threat: towards automatically, self-diversifying malware Mathias Payer

    SyScan’14, April 2–4, 2014, Singapore, Singapore Embracing the new threat: towards automatically, self-diversifying malware Mathias Payer

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    44Characterizing Malware with MAEC and STIX v1.0 April 21st, 2014 Introduction This document describes the use of the Malware Attribute Enumeration and Characterization (MAEC)

    Characterizing Malware with MAEC and STIX v1.0 April 21st, 2014 Introduction This document describes the use of the Malware Attribute Enumeration and Characterization (MAEC)

    Add to Reading List

    Source URL: maecproject.github.io

    Language: English - Date: 2016-06-15 18:10:07
    45Scalable Traffic Dependence Analysis for Detecting Android Malware Activities∗ Hao Zhang, Danfeng (Daphne) Yao, and Naren Ramakrishnan Department of Computer Science, Virginia Tech Blacksburg, VA, USA {haozhang, danfen

    Scalable Traffic Dependence Analysis for Detecting Android Malware Activities∗ Hao Zhang, Danfeng (Daphne) Yao, and Naren Ramakrishnan Department of Computer Science, Virginia Tech Blacksburg, VA, USA {haozhang, danfen

    Add to Reading List

    Source URL: www-bcf.usc.edu

    Language: English - Date: 2015-10-14 16:54:25
      46COLUMNS Exploring with a Purpose D A N G E E R A N D J AY J A C O B S Dan Geer is the CISO for In-QTel and a security researcher with a quantitative bent. He has

      COLUMNS Exploring with a Purpose D A N G E E R A N D J AY J A C O B S Dan Geer is the CISO for In-QTel and a security researcher with a quantitative bent. He has

      Add to Reading List

      Source URL: www.usenix.org

      Language: English - Date: 2016-02-20 09:35:48
      47BOT-TREK CYBER INTELLIGENCE ci.group-ib.com GROUP-IB REPORT: ANALYSIS OF ATTACKS AGAINST TRADING AND BANK CARD

      BOT-TREK CYBER INTELLIGENCE ci.group-ib.com GROUP-IB REPORT: ANALYSIS OF ATTACKS AGAINST TRADING AND BANK CARD

      Add to Reading List

      Source URL: www.group-ib.ru

      Language: English - Date: 2016-02-08 03:52:06
      48LUCRATIVE RANSOMWARE ATTACKS:  Analysis of the CryptoWall Version 3 Threat EXECUTIVE SUMMARY The Cyber Threat Alliance (CTA) is a group of leading cybersecurity solution providers who have joined

      LUCRATIVE RANSOMWARE ATTACKS: Analysis of the CryptoWall Version 3 Threat EXECUTIVE SUMMARY The Cyber Threat Alliance (CTA) is a group of leading cybersecurity solution providers who have joined

      Add to Reading List

      Source URL: cyberthreatalliance.org

      Language: English - Date: 2015-10-30 18:02:03
      491  Enhancing Automated Malware Analysis Machines with Memory Analysis Tomer Teller, Adi Hayon Security Innovation Group

      1 Enhancing Automated Malware Analysis Machines with Memory Analysis Tomer Teller, Adi Hayon Security Innovation Group

      Add to Reading List

      Source URL: www.blackhat.com

      Language: English - Date: 2015-05-28 15:50:59