Ελάτε μαζί μας στο Binding Hook Live στις 27 Οκτωβρίου στο Underbelly Boulevard Soho στο Λονδίνο
Ελάτε μαζί μας στο Binding Hook Live

Advanced Malware Analysis

This module explores advanced malware analysis, focusing on the dissection and examination of malicious software to understand its origins, functionality, and impact on information systems.

Πύλη > Κυβερνοασφάλεια > Advanced Malware Analysis

Δημιουργός προγράμματος σπουδών

Treadwell, Scott, and Mian Zhou. “A Heuristic Approach for Detection of Obfuscated Malware.” In 2009 IEEE International Conference on Intelligence and Security Informatics, 291–99. Dallas, TX: IEEE, 2009.

https://doi.org/10.1109/ISI.2009.5137328

Stevens, Didier. “Malicious PDF Documents Explained.” IEEE Security & Privacy 9, no. 1 (January 2011): 80–82.

https://doi.org/10.1109/MSP.2011.14

Shin, Seungwon, and Guofei Gu. “Conficker and beyond: A Large-Scale Empirical Study.” In Proceedings of the 26th Annual Computer Security Applications Conference, 151–60. Austin Texas USA: ACM, 2010.

https://doi.org/10.1145/1920261.1920285

Egele, Manuel, Theodoor Scholte, Engin Kirda, and Christopher Kruegel. “A Survey on Automated Dynamic Malware-Analysis Techniques and Tools.” ACM Computing Surveys 44, no. 2 (2012): 1–42.

https://doi.org/10.1145/2089125.2089126

He, Liang, Yan Cai, Hong Hu, Purui Su, Zhenkai Liang, Yi Yang, Huafeng Huang, Jia Yan, Xiangkun Jia, and Dengguo Feng. “Automatically Assessing Crashes from Heap Overflows.” In 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE), 274–79. Urbana, IL: IEEE, 2017.

https://doi.org/10.1109/ASE.2017.8115640

Coogan, Kevin, Gen Lu, and Saumya Debray. “Deobfuscation of Virtualization-Obfuscated Software: A Semantics-Based Approach.” In Proceedings of the 18th ACM Conference on Computer and Communications Security, 275–84. Chicago Illinois USA: ACM, 2011.

https://doi.org/10.1145/2046707.2046739

Sharif, Monirul, Andrea Lanzi, Jonathon Giffin, and Wenke Lee. “Automatic Reverse Engineering of Malware Emulators.” In 2009 30th IEEE Symposium on Security and Privacy, 94–109, 2009.

https://doi.org/10.1109/SP.2009.27

Lee, JongHyup, Thanassis  Avgerinos, and David Brumley. “TIE: Principled Reverse Engineering of Types in Binary Programs.” In Network and Distributed System Security Symposium, 1471860 Bytes, 2011.

https://doi.org/10.1184/R1/6469466.V1

Sun, Mingshen, Tao Wei, and John C.S. Lui. “TaintART: A Practical Multi-Level Information-Flow Tracking System for Android RunTime.” In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 331–42. Vienna Austria: ACM, 2016.

https://doi.org/10.1145/2976749.2978343

Sikorski, Michael, and Andrew Honig. Practical Malware Analysis: The Hands-on Guide to Dissecting Malicious Software. San Francisco: No Starch Press, 2012.

Σας ευχαριστούμε για την εγγραφή σας στο ενημερωτικό μας δελτίο!

Thank you! RSVP received for Treadwell, Scott, and Mian Zhou. “A Heuristic Approach for Detection of Obfuscated Malware.” In 2009 IEEE International Conference on Intelligence and Security Informatics, 291–99. Dallas, TX: IEEE, 2009.

Σας ευχαριστούμε για την αίτησή σας! Θα επικοινωνήσουμε μαζί σας.

Apply for: Treadwell, Scott, and Mian Zhou. “A Heuristic Approach for Detection of Obfuscated Malware.” In 2009 IEEE International Conference on Intelligence and Security Informatics, 291–99. Dallas, TX: IEEE, 2009.

Treadwell, Scott, and Mian Zhou. “A Heuristic Approach for Detection of Obfuscated Malware.” In 2009 IEEE International Conference on Intelligence and Security Informatics, 291–99. Dallas, TX: IEEE, 2009.

Φόρτωση...

Φόρτωση...