Malware analysis

Results: 349



#Item
141Botnets / Spamming / Malware / Cyberwarfare / Storm botnet / Zeus / Rustock botnet / Storm Worm / Rootkit / Computing / Computer network security / Multi-agent systems

On the Analysis of the Zeus Botnet Crimeware Toolkit H. Binsalleeh †‡, T. Ormerod †‡, A. Boukhtouta †‡, P. Sinha †‡, A. Youssef †‡, M. Debbabi †‡, and L. Wang †‡ † National Cyber Forensics a

Add to Reading List

Source URL: www.ncfta.ca

Language: English
142Computer / John Vincent Atanasoff / Mind / Science / Electronics / Malware / Software bug / Analysis

Thursday, Oct. 2nd 3:40p.m. @ B29 Atanasoff Program Representation for Symbolic Analysis Symbolic analysis is a type of program analysis

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2014-10-03 09:24:23
143Call graph / Malware / Mind / Science / Cognition / Analysis / Critical thinking / Thought

Enter Sandbox: Android Sandbox Comparison Sebastian Neuner, Victor van der Veen, Martina Lindorfer, Markus Huber, Georg Merzdovnik, Martin Mulazzani and Edgar Weippl

Add to Reading List

Source URL: mostconf.org

Language: English - Date: 2014-07-18 15:41:58
144Computing / Embedded Linux / Free software / Google / Cloud clients / Malware / Android software development / Android Market / APK / Smartphones / Android / Software

Andlantis: Large-scale Android Dynamic Analysis Michael Bierma†‡ , Eric Gustafson‡ , Jeremy Erickson† , David Fritz† , Yung Ryn Choe† ∗† Sandia National Laboratories {mbierma, jericks, djfritz, yrchoe}@sa

Add to Reading List

Source URL: mostconf.org

Language: English - Date: 2014-05-17 09:18:09
145Cyberwarfare / Stack buffer overflow / Buffer overflow / Uncontrolled format string / Vulnerability / Valgrind / C / Malware / Pointer / Computing / Software bugs / Software engineering

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome [removed] Carnegie Mellon University Abstract

Add to Reading List

Source URL: valgrind.org

Language: English - Date: 2006-08-12 00:33:35
146Search algorithms / Cluster analysis / Jaccard index / Hierarchical clustering / Hash function / Statistics / Antivirus software / Malware

BitShred: Feature Hashing Malware for Scalable Triage and Semantic Analysis Jiyong Jang David Brumley

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
147Security / Software testing / Hacking / Vulnerability / Exploit / Social engineering / Malware / Password / Access control / Computer network security / Cyberwarfare / Computer security

Analysis of Social Engineering Threats with Attack Graphs Kristian Beckers1 , Leanid Krautsevich2 , Artsiom Yautsiukhin2 1 paluno – The Ruhr Institute for Software Technology – University of Duisburg-Essen

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2015-04-02 07:11:50
148Cross-platform software / Java platform / Java programming language / Computer security / Antivirus software / Java applet / Applet / Java / Malware / Computing / Software / System software

Jarhead Analysis and Detection of Malicious Java Applets Johannes Schlumberger Christopher Kruegel

Add to Reading List

Source URL: wwwcip.cs.fau.de

Language: English - Date: 2012-10-25 21:36:58
149Computer security / Malware / Proprietary software / Rootkit / Norton AntiVirus / Clam AntiVirus / Computer virus / Trend Micro / Spyware / System software / Software / Antivirus software

Automated Classification and Analysis of Internet Malware Michael Bailey1 , Jon Oberheide1 , Jon Andersen1 , Z. Morley Mao1 , Farnam Jahanian1,2 , and Jose Nazario2 1

Add to Reading List

Source URL: mdbailey.ece.illinois.edu

Language: English - Date: 2014-08-05 13:28:23
150Cross-platform software / CapDesk / Java / Sandbox / Malware / Confused deputy problem / Computing / System software / Software

A Security Analysis of the Combex DarpaBrowser Architecture David Wagner Dean Tribble March 4, 2002

Add to Reading List

Source URL: www.combex.com

Language: English - Date: 2005-08-18 16:59:23
UPDATE