Barker, 2021 - Google Patents
Malware Analysis Techniques: Tricks for the triage of adversarial softwareBarker, 2021
View PDF- Document ID
- 13135610390791275951
- Author
- Barker D
- Publication year
External Links
Snippet
Analyze malicious samples, write reports, and use industry-standard methodologies to confidently triage and analyze adversarial software and malware Key FeaturesInvestigate, detect, and respond to various types of malware threatUnderstand how to use what you've …
- 238000004458 analytical method 0 title abstract description 246
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Monnappa | Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware | |
Yong Wong et al. | An inside look into the practice of malware analysis | |
Wei et al. | Deep ground truth analysis of current android malware | |
Spreitzenbarth et al. | Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques | |
Oosthoek et al. | Sok: Att&ck techniques and trends in windows malware | |
Plohmann et al. | Malpedia: a collaborative effort to inventorize the malware landscape | |
US11431751B2 (en) | Live forensic browsing of URLs | |
Casey et al. | Malware forensics field guide for Linux systems: digital forensics field guides | |
US11416613B2 (en) | Attack detection through exposure of command abuse | |
Barker | Malware Analysis Techniques: Tricks for the triage of adversarial software | |
Bhardwaj et al. | Framework to perform taint analysis and security assessment of IoT devices in smart cities | |
Delosières et al. | Infrastructure for detecting Android malware | |
Spreitzenbarth et al. | Mastering python forensics | |
US20240338447A1 (en) | Automated attack chain following by a threat analysis platform | |
US20240330454A1 (en) | File analysis engines for identifying security-related threats | |
Ostrovskaya et al. | Practical Memory Forensics: Jumpstart effective forensic analysis of volatile memory | |
Spreitzenbarth | Dissecting the Droid: Forensic analysis of android and its malicious applications | |
Jaswal | Mastering Metasploit | |
Le et al. | A Basic Malware Analysis Process Based on FireEye Ecosystem. | |
Oberoi | Androsat: Security analysis tool for android applications | |
Sindoni | Toward a methodology for malware analysis and characterization for Machine Learning application | |
Fichera et al. | Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response | |
Rudametkin | Improving the Security and Privacy of the Web through Browser Fingerprinting | |
Hovmark et al. | Towards Extending Probabilistic Attack Graphs with Forensic Evidence: An investigation of property list files in macOS | |
Tascon Gutierrez et al. | Malware Sandbox Deployment, Analysis and Development |