Malware analysis

Results: 349



#Item
1Improving the Efficiency of Dynamic Malware Analysis Ulrich Bayer Engin Kirda  Christopher Kruegel

Improving the Efficiency of Dynamic Malware Analysis Ulrich Bayer Engin Kirda Christopher Kruegel

Add to Reading List

Source URL: seclab.ccs.neu.edu

Language: English - Date: 2018-08-14 16:50:47
    2TECHNICAL FOLLOW UP - APT28 MALWARE ANALYSIS ROOT9B AUG 2015

    TECHNICAL FOLLOW UP - APT28 MALWARE ANALYSIS ROOT9B AUG 2015

    Add to Reading List

    Source URL: www.root9b.com

    Language: English - Date: 2015-08-20 09:25:23
      3VMR AY ANALY ZER  For Total Visibility and Defense Against Evasive Malware In the battle against malware, behavior-based analysis is one of the keys for security teams to detect and mitigate advanced threats. In

      VMR AY ANALY ZER For Total Visibility and Defense Against Evasive Malware In the battle against malware, behavior-based analysis is one of the keys for security teams to detect and mitigate advanced threats. In

      Add to Reading List

      Source URL: www.vmray.com

      Language: English - Date: 2018-06-09 05:35:20
        4DANFENG (DAPHNE) YAO RESEARCH INTERESTS Software and system security and assurance, including anomaly detection in networked systems and programs, system integrity, malware program analysis, security of mobile systems, c

        DANFENG (DAPHNE) YAO RESEARCH INTERESTS Software and system security and assurance, including anomaly detection in networked systems and programs, system integrity, malware program analysis, security of mobile systems, c

        Add to Reading List

        Source URL: people.cs.vt.edu

        Language: English - Date: 2018-04-09 14:09:44
          5Windows Malware Analysis with Memory Dumps Version 2.0 Dmitry Vostokov Software Diagnostics Services

          Windows Malware Analysis with Memory Dumps Version 2.0 Dmitry Vostokov Software Diagnostics Services

          Add to Reading List

          Source URL: www.patterndiagnostics.com

          Language: English - Date: 2017-10-01 19:01:21
            6Malware Analysis  Arun Lakhotia University of Louisiana at Lafayette, USA Presented at ISSISP 2017, CNRS Gif Sur Yvette

            Malware Analysis Arun Lakhotia University of Louisiana at Lafayette, USA Presented at ISSISP 2017, CNRS Gif Sur Yvette

            Add to Reading List

            Source URL: issisp2017.github.io

            - Date: 2017-07-26 05:14:50
              7Automatic Analysis of Malware Behavior using Machine Learning Konrad Rieck1 , Philipp Trinius2 , Carsten Willems2 , and Thorsten Holz2,3 1  3

              Automatic Analysis of Malware Behavior using Machine Learning Konrad Rieck1 , Philipp Trinius2 , Carsten Willems2 , and Thorsten Holz2,3 1 3

              Add to Reading List

              Source URL: filepool.informatik.uni-goettingen.de

              - Date: 2015-05-08 05:06:14
                8Virt-ICE: Next-generation Debugger for Malware Analysis Nguyen Anh Quynh, Kuniyasu Suzaki National Institute of Advanced Industrial Science and Technology, Japan Email: (nguyen.anhquynh,k.suzaki)@aist.go.jp  Abstract

                Virt-ICE: Next-generation Debugger for Malware Analysis Nguyen Anh Quynh, Kuniyasu Suzaki National Institute of Advanced Industrial Science and Technology, Japan Email: (nguyen.anhquynh,k.suzaki)@aist.go.jp Abstract

                Add to Reading List

                Source URL: media.blackhat.com

                - Date: 2012-04-07 14:53:10
                  9GOODWARE DRUGS FOR MALWARE: ON-THE-FLY MALWARE ANALYSIS AND CONTAINMENT DAMIANO BOLZONI CHRISTIAAN SCHADE TWENTE SECURITY LAB

                  GOODWARE DRUGS FOR MALWARE: ON-THE-FLY MALWARE ANALYSIS AND CONTAINMENT DAMIANO BOLZONI CHRISTIAAN SCHADE TWENTE SECURITY LAB

                  Add to Reading List

                  Source URL: media.blackhat.com

                  - Date: 2012-04-07 14:52:47
                    10Rage Against the Virtual Machine: Hindering Dynamic Analysis of Android Malware Thanasis Petsas,* Giannis Voyatzis,* Elias Athanasopoulos,* Michalis Polychronakis,† Sotiris Ioannidis* *

                    Rage Against the Virtual Machine: Hindering Dynamic Analysis of Android Malware Thanasis Petsas,* Giannis Voyatzis,* Elias Athanasopoulos,* Michalis Polychronakis,† Sotiris Ioannidis* *

                    Add to Reading List

                    Source URL: www.necoma-project.eu

                    - Date: 2014-04-25 08:04:21