Advanced Malware Analysis

This module explores advanced malware analysis, focusing on the dissection and examination of malicious software to understand its origins, functionality, and impact on information systems.

Portal > Cybersecurity > Advanced Malware Analysis

Curriculum Builder

Treadwell, Scott, and Mian Zhou. “A Heuristic Approach for Detection of Obfuscated Malware.” In 2009 IEEE International Conference on Intelligence and Security Informatics, 291–99. Dallas, TX: IEEE, 2009.

https://doi.org/10.1109/ISI.2009.5137328

Stevens, Didier. “Malicious PDF Documents Explained.” IEEE Security & Privacy 9, no. 1 (January 2011): 80–82.

https://doi.org/10.1109/MSP.2011.14

Shin, Seungwon, and Guofei Gu. “Conficker and beyond: A Large-Scale Empirical Study.” In Proceedings of the 26th Annual Computer Security Applications Conference, 151–60. Austin Texas USA: ACM, 2010.

https://doi.org/10.1145/1920261.1920285

Egele, Manuel, Theodoor Scholte, Engin Kirda, and Christopher Kruegel. “A Survey on Automated Dynamic Malware-Analysis Techniques and Tools.” ACM Computing Surveys 44, no. 2 (2012): 1–42.

https://doi.org/10.1145/2089125.2089126

He, Liang, Yan Cai, Hong Hu, Purui Su, Zhenkai Liang, Yi Yang, Huafeng Huang, Jia Yan, Xiangkun Jia, and Dengguo Feng. “Automatically Assessing Crashes from Heap Overflows.” In 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE), 274–79. Urbana, IL: IEEE, 2017.

https://doi.org/10.1109/ASE.2017.8115640

Coogan, Kevin, Gen Lu, and Saumya Debray. “Deobfuscation of Virtualization-Obfuscated Software: A Semantics-Based Approach.” In Proceedings of the 18th ACM Conference on Computer and Communications Security, 275–84. Chicago Illinois USA: ACM, 2011.

https://doi.org/10.1145/2046707.2046739

Sharif, Monirul, Andrea Lanzi, Jonathon Giffin, and Wenke Lee. “Automatic Reverse Engineering of Malware Emulators.” In 2009 30th IEEE Symposium on Security and Privacy, 94–109, 2009.

https://doi.org/10.1109/SP.2009.27

Lee, JongHyup, Thanassis  Avgerinos, and David Brumley. “TIE: Principled Reverse Engineering of Types in Binary Programs.” In Network and Distributed System Security Symposium, 1471860 Bytes, 2011.

https://doi.org/10.1184/R1/6469466.V1

Sun, Mingshen, Tao Wei, and John C.S. Lui. “TaintART: A Practical Multi-Level Information-Flow Tracking System for Android RunTime.” In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 331–42. Vienna Austria: ACM, 2016.

https://doi.org/10.1145/2976749.2978343

Sikorski, Michael, and Andrew Honig. Practical Malware Analysis: The Hands-on Guide to Dissecting Malicious Software. San Francisco: No Starch Press, 2012.

Thank you for signing up to our newsletter!

Thank you! RSVP received for Treadwell, Scott, and Mian Zhou. “A Heuristic Approach for Detection of Obfuscated Malware.” In 2009 IEEE International Conference on Intelligence and Security Informatics, 291–99. Dallas, TX: IEEE, 2009.

Thank you for applying! We will be in touch.

Apply for: Treadwell, Scott, and Mian Zhou. “A Heuristic Approach for Detection of Obfuscated Malware.” In 2009 IEEE International Conference on Intelligence and Security Informatics, 291–99. Dallas, TX: IEEE, 2009.

Treadwell, Scott, and Mian Zhou. “A Heuristic Approach for Detection of Obfuscated Malware.” In 2009 IEEE International Conference on Intelligence and Security Informatics, 291–99. Dallas, TX: IEEE, 2009.

Loading...

Loading…