Malware analysis

Results: 349



#Item
51Macroeconomic Analysis of Malware Vaibhav Garg, L. Jean Camp School of Informatics and Computing Indiana University {gargv, ljcamp}@indiana.edu

Macroeconomic Analysis of Malware Vaibhav Garg, L. Jean Camp School of Informatics and Computing Indiana University {gargv, ljcamp}@indiana.edu

Add to Reading List

Source URL: www.ljean.com

Language: English - Date: 2013-08-22 12:18:46
    52AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis Zhaoyan Xu Antonio Nappa

    AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis Zhaoyan Xu Antonio Nappa

    Add to Reading List

    Source URL: faculty.cs.tamu.edu

    Language: English - Date: 2014-09-29 02:03:52
    53Hack.lu edition 2012 A forensic analysis of Android Malware Wednesday, 24th October 2012 K EVIN A LLIX,  Q UENTIN J EROME,  R ADU S TATE,

    Hack.lu edition 2012 A forensic analysis of Android Malware Wednesday, 24th October 2012 K EVIN A LLIX, Q UENTIN J EROME, R ADU S TATE,

    Add to Reading List

    Source URL: archive.hack.lu

    Language: English - Date: 2012-10-31 10:30:13
      54JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JANUARYBehavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in

      JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JANUARYBehavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in

      Add to Reading List

      Source URL: www.cs.umd.edu

      Language: English - Date: 2014-03-28 12:39:15
      55The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master’s degree program. These certificate programs will augment your skills, provide specialized t

      The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master’s degree program. These certificate programs will augment your skills, provide specialized t

      Add to Reading List

      Source URL: www.sans.edu

      Language: English - Date: 2015-08-20 16:00:38
      56Flowers for Automated Malware Analysis Chengyu Song and Paul Royal Georgia Institute of Technology ,   ABSTRACT

      Flowers for Automated Malware Analysis Chengyu Song and Paul Royal Georgia Institute of Technology , ABSTRACT

      Add to Reading List

      Source URL: media.blackhat.com

      Language: English - Date: 2012-07-22 17:41:57
        57IRMA An Open-Source Incident Response & Malware Analysis Platform Alexandre Quint Guillaume Dedrie Fernand Lone Sang {aquint, gdedrie, flonesang}@quarkslab.com Hack.lu

        IRMA An Open-Source Incident Response & Malware Analysis Platform Alexandre Quint Guillaume Dedrie Fernand Lone Sang {aquint, gdedrie, flonesang}@quarkslab.com Hack.lu

        Add to Reading List

        Source URL: archive.hack.lu

        Language: English - Date: 2014-10-23 17:41:44
          58The Ghost In The Browser Analysis of Web-based Malware Niels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang and Nagendra Modadugu Google, Inc. {niels, deanm, panayiotis, kewang, ngm}@google.com

          The Ghost In The Browser Analysis of Web-based Malware Niels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang and Nagendra Modadugu Google, Inc. {niels, deanm, panayiotis, kewang, ngm}@google.com

          Add to Reading List

          Source URL: www.usenix.org

          Language: English - Date: 2007-04-04 22:47:21
            59Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of California

            Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of California

            Add to Reading List

            Source URL: seclab.cs.ucsb.edu

            Language: English - Date: 2010-12-20 14:49:07
            60Rage Against The Virtual Machine: Hindering Dynamic Analysis of Android Malware Thanasis Petsas, Giannis Voyatzis, Elias Athanasopoulos, Sotiris Ioannidis,

            Rage Against The Virtual Machine: Hindering Dynamic Analysis of Android Malware Thanasis Petsas, Giannis Voyatzis, Elias Athanasopoulos, Sotiris Ioannidis,

            Add to Reading List

            Source URL: www.syssec-project.eu

            Language: English - Date: 2014-07-07 09:14:35