Malware analysis

Results: 349



#Item
81

AnaDroid: Malware Analysis of Android with User-supplied Predicates Shuying Liang,1,2 Matthew Might1 School of Computing, University of Utah Salt Lake City, Utah, USA

Add to Reading List

Source URL: shuying.me

- Date: 2014-08-04 01:24:54
    82

    Automated Classification and Analysis of Internet Malware Michael Bailey1 , Jon Oberheide1 , Jon Andersen1 , Z. Morley Mao1 , Farnam Jahanian1,2 , and Jose Nazario2 1

    Add to Reading List

    Source URL: web.engr.illinois.edu

    Language: English - Date: 2014-08-05 13:28:23
      83

      Sound and Precise Malware Analysis for Android via Pushdown Reachability and Entry-Point Saturation Shuying Liang, Andrew W. Keep, Matthew Might, Steven Lyde, Thomas Gilray, and Petey Aldous University of Utah

      Add to Reading List

      Source URL: www.andykeep.com

      Language: English - Date: 2013-10-07 03:39:55
        84Internet / Proxy server / Malware / Denial-of-service attack / Botnet / Moose / Server / Router / NAT traversal / Computer network security / Computing / Network architecture

        Dissecting Linux/Moose The Analysis of a Linux Router-based Worm Hungry for Social Networks Olivier Bilodeau

        Add to Reading List

        Source URL: www.welivesecurity.com

        Language: English - Date: 2015-05-22 12:40:42
        85Antivirus software / Malware / Computer virus

        IRMA An Open-Source Incident Response & Malware Analysis Platform Alexandre Quint Fernand Lone-Sang Guillaume Dedrie {aquint, flonesang, gdedrie}@quarkslab.com Hack In The Box (HITB)

        Add to Reading List

        Source URL: www.quarkslab.com

        Language: English - Date: 2014-11-07 10:50:15
        86Antivirus software / Malware / Computer virus

        IRMA An Open-Source Incident Response & Malware Analysis Platform Alexandre Quint Guillaume Dedrie Fernand Lone Sang {aquint, gdedrie, flonesang}@quarkslab.com Hack.lu

        Add to Reading List

        Source URL: www.quarkslab.com

        Language: English - Date: 2014-11-07 10:44:31
        87Computer crimes / Bank fraud / Zeus / Malware / Computer security / Kaspersky Lab / Software / Spamming / Antivirus software / System software / Botnets

        The Luuuk banking fraud campaign: half a million euros stolen in a single week The Luuuk banking fraud campaign: half a million euros stolen in a single week The experts at Kaspersky Lab’s Global Research and Analysis

        Add to Reading List

        Source URL: press.kaspersky.com

        Language: English - Date: 2014-06-20 07:32:13
        88System software / Electronic voting / Information society / Malware / Botnet / Server / X Window System / Internet Relay Chat / Client honeypot / Computing / Software / Computer network security

        Security Analysis of the Estonian Internet Voting System J. Alex Halderman1 Harri Hursti Jason Kitcat2 Margaret MacAlpine Travis Finkenauer1 Drew Springall1 1 University of Michigan, Ann Arbor, MI, U.S.A.

        Add to Reading List

        Source URL: www.verifiedvoting.org

        Language: English - Date: 2014-10-07 12:28:22
        89Malware / Antivirus software

        Behavior-based Methods for Automated, Scalable Malware Analysis Stefano Zanero, PhD Assistant Professor, Politecnico di Milano Knowing the enemy = key for success

        Add to Reading List

        Source URL: www.syssec-project.eu

        Language: English - Date: 2014-12-29 15:02:51
        90Cybercrime / United States Department of Defense / Information Assurance Technology Analysis Center / Malware / Computer crimes / Angela Orebaugh / Threat / Koobface / Computer security / Security / Computer network security / Cyberwarfare

        Volume 15 Number 2 • SpringThe Newsletter for Information Assurance Technology Professionals

        Add to Reading List

        Source URL: www.csiac.org

        Language: English - Date: 2013-02-14 11:01:15
        UPDATE