Showing 1 - 10 of 24 results for the Malware Analysis
Jeff Gennari discusses updates to the Pharos framework, which automates reverse engineering of malware analysis, including new tools, improvements, and bug fixes.
This webinar describes some of the issues involved in automating the collection and analysis of malware, which has seen exponential growth over the past decade.
In this podcast, Jeff Gennari explains that analyzing malware is essential to assessing the damage and reducing the impact associated with ongoing infection.
This presentation describes initial research conducted by CERT and Carnegie Mellon to determine if malware report databases were amenable to automated processing to identify flaws
This technical note explores the development of security requirements for the K-9 Mail application, an open source email client for the Android operating system.
This report describes individual and team factors that enable, encumber, or halt the development of malicious-code reverse engineering expertise.
In this paper, Ross Kinder discusses how malware analysis supports the efforts of those pursuing adversaries employing malicious code in their tradecraft.
In this article, the authors present a static approach that uses symbolic execution and inter-procedural data flow analysis to discover object instances, data members, and methods of a common class.
Pharos is a static binary analysis framework that facilitates the automated analysis of binary programs.
Rhiannon Weaver discusses how a small subset of features from dynamic malware analysis can help to uncover possible relationships among files and to direct static reverse engineering efforts.