Erweiterte Malware-Analyse

Dieses Modul befasst sich mit fortgeschrittener Malware-Analyse, wobei der Schwerpunkt auf der Zerlegung und Untersuchung von Schadsoftware liegt, um deren Ursprung, Funktionsweise und Auswirkungen auf Informationssysteme zu verstehen.

Portal > Cybersecurity > Erweiterte Malware-Analyse

Curriculum Builder

Treadwell, Scott, und Mian Zhou. "A Heuristic Approach for Detection of Obfuscated Malware". In 2009 IEEE International Conference on Intelligence and Security Informatics, 291-99. Dallas, TX: IEEE, 2009.

https://doi.org/10.1109/ISI.2009.5137328

Stevens, Didier. "Malicious PDF Documents Explained". IEEE Security & Privacy 9, Nr. 1 (Januar 2011): 80-82.

https://doi.org/10.1109/MSP.2011.14

Shin, Seungwon, und Guofei Gu. "Conficker und darüber hinaus: A Large-Scale Empirical Study" (Eine groß angelegte empirische Studie). In Proceedings of the 26th Annual Computer Security Applications Conference, 151-60. Austin, Texas, USA: ACM, 2010.

https://doi.org/10.1145/1920261.1920285

Egele, Manuel, Theodoor Scholte, Engin Kirda, und Christopher Kruegel. "A Survey on Automated Dynamic Malware-Analysis Techniques and Tools." ACM Computing Surveys 44, no. 2 (2012): 1-42.

https://doi.org/10.1145/2089125.2089126

He, Liang, Yan Cai, Hong Hu, Purui Su, Zhenkai Liang, Yi Yang, Huafeng Huang, Jia Yan, Xiangkun Jia, und Dengguo Feng. "Automatically Assessing Crashes from Heap Overflows". In 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE), 274-79. Urbana, IL: IEEE, 2017.

https://doi.org/10.1109/ASE.2017.8115640

Coogan, Kevin, Gen Lu, und Saumya Debray. "Deobfuscation of Virtualization-Obfuscated Software: A Semantics-Based Approach." In Proceedings of the 18th ACM Conference on Computer and Communications Security, 275-84. Chicago Illinois USA: ACM, 2011.

https://doi.org/10.1145/2046707.2046739

Sharif, Monirul, Andrea Lanzi, Jonathon Giffin, und Wenke Lee. "Automatisches Reverse Engineering von Malware-Emulatoren". In 2009 30th IEEE Symposium on Security and Privacy, 94-109, 2009.

https://doi.org/10.1109/SP.2009.27

Lee, JongHyup, Thanassis Avgerinos, und David Brumley. "TIE: Principled Reverse Engineering of Types in Binary Programs." In Network and Distributed System Security Symposium, 1471860 Bytes, 2011.

https://doi.org/10.1184/R1/6469466.V1

Sun, Mingshen, Tao Wei, und John C.S. Lui. "TaintART: A Practical Multi-Level Information-Flow Tracking System for Android RunTime." In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 331-42. Vienna Austria: ACM, 2016.

https://doi.org/10.1145/2976749.2978343

Sikorski, Michael, und Andrew Honig. Praktische Malware-Analyse: Ein praktischer Leitfaden zur Analyse von bösartiger Software. San Francisco: No Starch Press, 2012.

Vielen Dank, dass Sie sich für unseren Newsletter angemeldet haben!

Dankeschön! RSVP erhalten für Treadwell, Scott, und Mian Zhou. "A Heuristic Approach for Detection of Obfuscated Malware". In 2009 IEEE International Conference on Intelligence and Security Informatics, 291-99. Dallas, TX: IEEE, 2009.

Treadwell, Scott, und Mian Zhou. "A Heuristic Approach for Detection of Obfuscated Malware". In 2009 IEEE International Conference on Intelligence and Security Informatics, 291-99. Dallas, TX: IEEE, 2009.

Laden...

Laden...