Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type


Publication Date

Showing 1 - 10 of 39 results for Malware Analysis

Podcast | September 2018 - Podcast Using Test Suites for Static Analysis Alert Classifiers By Lori Flynn, Zach Kurtz

CERT researchers Lori Flynn and Zach Kurtz discuss ongoing research using test suites as a source of labeled training data to create classifiers for static analysis alerts.

Podcast | December 2017 - Podcast Pharos Binary Static Analysis: An Update By Jeff Gennari

Jeff Gennari discusses updates to the Pharos framework, which automates reverse engineering of malware analysis, including new tools, improvements, and bug fixes.

Presentation | September 2018 - Presentation Automating Static Analysis Alert Handling with Machine ... By Lori Flynn

This presentation was given by author Lori Flynn Presented to: Raytheon’s Systems And Software Assurance Technology Interest Group.

Webinar | January 2017 - Webinar Building and Scaling a Malware Analysis System By Brent Frye

This webinar describes some of the issues involved in automating the collection and analysis of malware, which has seen exponential growth over the past decade.

Podcast | July 2011 - Podcast Building a Malware Analysis Capability By Jeff Gennari, Julia H. Allen

In this podcast, Jeff Gennari explains that analyzing malware is essential to assessing the damage and reducing the impact associated with ongoing infection.

Presentation | March 2017 - Presentation Using Malware Analysis to Identify Overlooked Security ... By Nancy R. Mead, Jose A. Morales

This presentation describes initial research conducted by CERT and Carnegie Mellon to determine if malware report databases were amenable to automated processing to identify flaws

Technical Note | November 2014 - Technical Note Using Malware Analysis to Tailor SQUARE for Mobile ... By Gregory Paul Alice, Nancy R. Mead

This technical note explores the development of security requirements for the K-9 Mail application, an open source email client for the Android operating system.

Technical Report | June 2014 - Technical Report Job Analysis Results for Malicious-Code Reverse Engineers ... By Jennifer Cowley

This report describes individual and team factors that enable, encumber, or halt the development of malicious-code reverse engineering expertise.

White Paper | July 2007 - White Paper The Use of Malware Analysis in Support of Law Enforcement By Ross Kinder

In this paper, Ross Kinder discusses how malware analysis supports the efforts of those pursuing adversaries employing malicious code in their tradecraft.

Article | October 2014 - Article Recovering C++ Objects From Binaries Using Inter-Procedural ... By Wesley Jin, Cory Cohen, Jeff Gennari, Chuck Hines, Sagar Chaki, Arie Gurfinkel, Jeff Havrilla, Priya Narasimhan (Carnegie Mellon University)

In this article, the authors present a static approach that uses symbolic execution and inter-procedural data flow analysis to discover object instances, data members, and methods of a common class.