Showing 1 - 10 of 37 results for the Malware Analysis
This technical note explores the development of security requirements for the K-9 Mail application, an open source email client for the Android operating system.
This report describes individual and team factors that enable, encumber, or halt the development of malicious-code reverse engineering expertise.
In this article, the authors present a static approach that uses symbolic execution and inter-procedural data flow analysis to discover object instances, data members, and methods of a common class.
In this paper, Ross Kinder discusses how malware analysis supports the efforts of those pursuing adversaries employing malicious code in their tradecraft.
This report provides brief abstracts for major research projects, followed by more detailed descriptions of these projects, for all CERT research conducted in the year 2005.
In this 2005 report, the authors summarize CERT research conducted in fiscal year 2005.
Learn how the CERT Division can help you keep pace with cybersecurity challenges.
In this 2010 report, the authors highlight CERT Division 2010 accomplishments and activities in successfully executing its research strategy.
This catalog summarizes the cybersecurity courses and certificates offered by the CERT Division of the SEI.
In this article, the authors present an alternative to pair wise comparisons based on