Malware analysis

Results: 349



#Item
91Antivirus software / Malware / Computer virus

Behavior-based Methods for Automated, Scalable Malware Analysis Stefano Zanero, PhD Assistant Professor, Politecnico di Milano Knowing the enemy = key for success

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-08-28 13:24:43
92Antivirus software / Malware / Computer virus

Behavior-based Methods for Automated, Scalable Malware Analysis Stefano Zanero, PhD Assistant Professor, Politecnico di Milano Knowing the enemy = key for success

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2013-07-04 15:35:10
93Antivirus software / Cloud computing / Malware / Android Market / Android / Threat / BitDefender / Nexus One / Software / Smartphones / Computing

MAST: Triage for Market-scale Mobile Malware Analysis Saurabh Chakradeo, Bradley Reaves, Patrick Traynor School of Computer Science Georgia Institute of Technology Atlanta, GA, USA

Add to Reading List

Source URL: www.enck.org

Language: English
94Computer security / Companies listed on the New York Stock Exchange / Computing / Malware / Netflow / Network security / Intrusion prevention system / Network Behavior Anomaly Detection / McAfee VirusScan / McAfee / Computer network security / System software

Data Sheet McAfee Network Threat Behavior Analysis Get complete visibility into network behavior and threats.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-05-05 14:02:43
95Computer virus / Cluster analysis / Hierarchical clustering / Statistics / Antivirus software / Malware

Kizzle: A Signature Compiler for Exploit Kits MSR-TRBen Stock Benjamin Livshits and Benjamin Zorn

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2015-02-13 19:37:17
96JavaScript / Form / Software / Computing / Malware

Malware analysis – Fake AV Downloader (part 1) by HauntIT Blog http://HauntIT.blogspot.com Summary:

Add to Reading List

Source URL: dl.packetstormsecurity.net

Language: English - Date: 2015-02-23 22:33:33
97Routing protocols / Internet protocols / Internet standards / Link analysis / Markov models / Border Gateway Protocol / PageRank / Routing / Malware / Internet / Network architecture / Computing

PDF Document

Add to Reading List

Source URL: www.circl.lu

Language: English - Date: 2015-05-23 03:05:46
98Malware / Technology / Computer hardware / Computing / VM / IBM

IBM Security HOW I FORCED AN ANDROID VULNERABILITY INTO BYPASSING MDM RESTRICTIONS + DIY MALWARE ANALYSIS

Add to Reading List

Source URL: www.dfrws.org

Language: English - Date: 2015-03-24 15:36:22
99Exploit / Arbitrary code execution / Malware / Software / Computing / Computer architecture / Smartphones / Android / Embedded Linux

EVOLUTION OF ANDROID EXPLOITS FROM A STATIC ANALYSIS TOOLS PERSPECTIVE VB2014: Anna Szalay & Jagadeesh Chandraiah

Add to Reading List

Source URL: www.virusbtn.com

Language: English - Date: 2014-09-28 16:17:40
100Netflow / Firewall / Network architecture / System software / Computer network security / Computing / Malware

Search and Destroy the Unknown FROM MALWARE ANALYSIS TO INDICATIONS OF COMPROMISE Who am I? 

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2015-04-17 09:40:03
UPDATE