Malware analysis

Results: 349



#Item
71

Impeding Malware Analysis Using Conditional Code Obfuscation Monirul Sharif1 1 Andrea Lanzi2

Add to Reading List

Source URL: www.iseclab.org

Language: English
    72

    IRMA Incident Response & Malware Analysis Hack in the Box - AmsterdamGuillaume Dedrie - Alexandre Quint - Fernand Lone Sang

    Add to Reading List

    Source URL: conference.hitb.org

    Language: English - Date: 2015-05-29 10:05:28
      73

      Improving  Scalable,  Automated   Baremetal  Malware  Analysis   Adam  Allred   Paul  Royal   Agenda  

      Add to Reading List

      Source URL: www.trailofbits.com

      Language: English - Date: 2016-02-09 02:00:29
        74Computer security / Malware / JavaScript / Threat / Change detection / Botnet / Computer network security / Computing / Cyberwarfare

        Poster: Web Change Analysis Approach for Malicious Website Detection SangYong Choi HoMook Cho

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2015-05-11 16:42:22
        75Shellcode / Malware / Software bugs / Hooking / Polymorphic code / Windows API / Code injection / Exploit / Application programming interface / Cyberwarfare / Computer security / Computing

        Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow Fabian Monrose

        Add to Reading List

        Source URL: wwwx.cs.unc.edu

        Language: English - Date: 2014-09-05 15:38:44
        76Computer network security / Open Source Tripwire / Computer security / GTK+ / Wireless networking / Rootkit / Wireshark / Pcap / Malware / Software / System software / Computing

        Chapter 10 Analysis of a Suspect Program: Linux Solutions in this chapter:

        Add to Reading List

        Source URL: scitechconnect.elsevier.com

        Language: English - Date: 2015-03-19 08:13:16
        77

        EU Agency analysis of ‘Stuxnet’ malware: a paradigm shift in threats and Critical Information Infrastructure Protection — ENISA

        Add to Reading List

        Source URL: www.cockpitci.eu

        - Date: 2014-03-25 07:46:52
          78Malware / Computer network security / Security / Rootkit / Computer virus / Analysis / Threat / Computer security / Cyberwarfare / Antivirus software

          Paper Title (use style: paper title)

          Add to Reading List

          Source URL: www.ieee-security.org

          Language: English - Date: 2015-05-11 16:42:23
          79Computer security / Debugging / Malware / Security / Linux malware

          REVERSE ENGINEERING MALWARE ANALYSIS REMA About the course

          Add to Reading List

          Source URL: www.silensec.com

          Language: English - Date: 2014-04-29 06:19:51
          80Data analysis / Data mining / Cloud computing / Microsoft / Business intelligence / Malware / Xbox Live / Computing / Statistics / Data management

          Where you start matters The first few years in your career are critical- they set the trajectory for your future. We know that as a student you want to be on the fast track and don’t have time to waste. Join us at Micr

          Add to Reading List

          Source URL: www.cs.tau.ac.il

          Language: English - Date: 2013-07-18 07:50:00
          UPDATE