Malware analysis

Results: 349



#Item
61

Rage Against the Virtual Machine: Hindering Dynamic Analysis of Android Malware Thanasis Petsas,* Giannis Voyatzis,* Elias Athanasopoulos,* Michalis Polychronakis,† Sotiris Ioannidis* *

Add to Reading List

Source URL: users.ics.forth.gr

Language: English - Date: 2014-04-24 09:36:10
    62

    New advances in Ms Office malware analysis

    Add to Reading List

    Source URL: archive.hack.lu

    Language: English - Date: 2009-10-31 16:26:07
      63Cryptography / Cyberwarfare / Malware / Malware analysis / Encryption / Rootkit / HTTPS / Botnet / Block cipher / Advanced Encryption Standard / Cipher / Draft:Energy related security attacks

      Institut für Technische Informatik und Kommunikationsnetze No´e Lutz

      Add to Reading List

      Source URL: www.kutter-fonds.ethz.ch

      Language: English - Date: 2010-05-16 10:46:32
      64

      Incident Response & Malware Analysis Guillaume Dedrie / Fernand Lone-Sang / Alexandre Quint Journée Sécurité - INSA Toulouse - LAAS CNRS

      Add to Reading List

      Source URL: congres.insa-toulouse.fr

      Language: French
        65Malware / Computing / Cyberwarfare / Statistical classification / Trojan horses / Botnets / Machine learning / Antivirus software / Malware analysis / Support vector machine / Zeus / Computer virus

        Unveiling Zeus Automated Classification of Malware Samples Abedelaziz Mohaisen Omar Alrawi

        Add to Reading List

        Source URL: www2013.wwwconference.org

        Language: English - Date: 2014-07-21 08:47:00
        66

        DISTRIBUTING THE RECONSTRUCTION OF HIGH-LEVEL INTERMEDIATE REPRESENTATION FOR LARGE SCALE MALWARE ANALYSIS Alexander Matrosov (@matrosov) Eugene Rodionov (@vxradius) 1 Gabriel Negreira Barbosa (@gabrielnb)

        Add to Reading List

        Source URL: www.intelsecurity.com

        Language: English - Date: 2015-08-17 11:32:33
          67

          Paul Melson Priority Health Two-For-One Talk: Malware Analysis for Everyone

          Add to Reading List

          Source URL: www.gr-issa.org

          Language: English - Date: 2009-10-18 15:03:27
            68

            Sound and Precise Malware Analysis for Android via Pushdown Reachability and Entry-Point Saturation Shuying Liang, Andrew W. Keep, Matthew Might, Steven Lyde, Thomas Gilray, and Petey Aldous University of Utah

            Add to Reading List

            Source URL: shuying.me

            Language: English
              69

              McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables Roberto Perdisci1,3 , Andrea Lanzi2,3 , Wenke Lee3,1 {, ,

              Add to Reading List

              Source URL: www.iseclab.org

              Language: English
                70

                A Survey on Automated Dynamic Malware Analysis Techniques and Tools MANUEL EGELE Vienna University of Technology THEODOOR SCHOLTE SAP Research, Sophia Antipolis

                Add to Reading List

                Source URL: iseclab.org

                Language: English
                  UPDATE