Showing 1 - 10 of 37 results for Malware Analysis
CERT researchers Lori Flynn and Zach Kurtz discuss ongoing research using test suites as a source of labeled training data to create classifiers for static analysis alerts.
Jeff Gennari discusses updates to the Pharos framework, which automates reverse engineering of malware analysis, including new tools, improvements, and bug fixes.
In this podcast, Jeff Gennari explains that analyzing malware is essential to assessing the damage and reducing the impact associated with ongoing infection.
This webinar describes some of the issues involved in automating the collection and analysis of malware, which has seen exponential growth over the past decade.
This technical note explores the development of security requirements for the K-9 Mail application, an open source email client for the Android operating system.
This presentation describes initial research conducted by CERT and Carnegie Mellon to determine if malware report databases were amenable to automated processing to identify flaws
This report describes individual and team factors that enable, encumber, or halt the development of malicious-code reverse engineering expertise.
In this paper, Ross Kinder discusses how malware analysis supports the efforts of those pursuing adversaries employing malicious code in their tradecraft.
In this article, the authors present a static approach that uses symbolic execution and inter-procedural data flow analysis to discover object instances, data members, and methods of a common class.
Pharos is a static binary analysis framework that facilitates the automated analysis of binary programs.