Malware analysis

Results: 349



#Item
1

Improving the Efficiency of Dynamic Malware Analysis Ulrich Bayer Engin Kirda Christopher Kruegel

Add to Reading List

Source URL: seclab.ccs.neu.edu

Language: English - Date: 2018-08-14 16:50:47
    2

    TECHNICAL FOLLOW UP - APT28 MALWARE ANALYSIS ROOT9B AUG 2015

    Add to Reading List

    Source URL: www.root9b.com

    Language: English - Date: 2015-08-20 09:25:23
      3

      VMR AY ANALY ZER For Total Visibility and Defense Against Evasive Malware In the battle against malware, behavior-based analysis is one of the keys for security teams to detect and mitigate advanced threats. In

      Add to Reading List

      Source URL: www.vmray.com

      Language: English - Date: 2018-06-09 05:35:20
        4

        DANFENG (DAPHNE) YAO RESEARCH INTERESTS Software and system security and assurance, including anomaly detection in networked systems and programs, system integrity, malware program analysis, security of mobile systems, c

        Add to Reading List

        Source URL: people.cs.vt.edu

        Language: English - Date: 2018-04-09 14:09:44
          5

          Windows Malware Analysis with Memory Dumps Version 2.0 Dmitry Vostokov Software Diagnostics Services

          Add to Reading List

          Source URL: www.patterndiagnostics.com

          Language: English - Date: 2017-10-01 19:01:21
            6

            Malware Analysis Arun Lakhotia University of Louisiana at Lafayette, USA Presented at ISSISP 2017, CNRS Gif Sur Yvette

            Add to Reading List

            Source URL: issisp2017.github.io

            - Date: 2017-07-26 05:14:50
              7

              Automatic Analysis of Malware Behavior using Machine Learning Konrad Rieck1 , Philipp Trinius2 , Carsten Willems2 , and Thorsten Holz2,3 1 3

              Add to Reading List

              Source URL: filepool.informatik.uni-goettingen.de

              - Date: 2015-05-08 05:06:14
                8

                Virt-ICE: Next-generation Debugger for Malware Analysis Nguyen Anh Quynh, Kuniyasu Suzaki National Institute of Advanced Industrial Science and Technology, Japan Email: (nguyen.anhquynh,k.suzaki)@aist.go.jp Abstract

                Add to Reading List

                Source URL: media.blackhat.com

                - Date: 2012-04-07 14:53:10
                  9

                  GOODWARE DRUGS FOR MALWARE: ON-THE-FLY MALWARE ANALYSIS AND CONTAINMENT DAMIANO BOLZONI CHRISTIAAN SCHADE TWENTE SECURITY LAB

                  Add to Reading List

                  Source URL: media.blackhat.com

                  - Date: 2012-04-07 14:52:47
                    10

                    Rage Against the Virtual Machine: Hindering Dynamic Analysis of Android Malware Thanasis Petsas,* Giannis Voyatzis,* Elias Athanasopoulos,* Michalis Polychronakis,† Sotiris Ioannidis* *

                    Add to Reading List

                    Source URL: www.necoma-project.eu

                    - Date: 2014-04-25 08:04:21
                      UPDATE