[go: up one dir, main page]

Barker, 2021 - Google Patents

Malware Analysis Techniques: Tricks for the triage of adversarial software

Barker, 2021

View PDF
Document ID
13135610390791275951
Author
Barker D
Publication year

External Links

Snippet

Analyze malicious samples, write reports, and use industry-standard methodologies to confidently triage and analyze adversarial software and malware Key FeaturesInvestigate, detect, and respond to various types of malware threatUnderstand how to use what you've …
Continue reading at cdn.ttgtmedia.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management

Similar Documents

Publication Publication Date Title
Monnappa Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Yong Wong et al. An inside look into the practice of malware analysis
Wei et al. Deep ground truth analysis of current android malware
Spreitzenbarth et al. Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques
Oosthoek et al. Sok: Att&ck techniques and trends in windows malware
Plohmann et al. Malpedia: a collaborative effort to inventorize the malware landscape
US11431751B2 (en) Live forensic browsing of URLs
Casey et al. Malware forensics field guide for Linux systems: digital forensics field guides
US11416613B2 (en) Attack detection through exposure of command abuse
Barker Malware Analysis Techniques: Tricks for the triage of adversarial software
Bhardwaj et al. Framework to perform taint analysis and security assessment of IoT devices in smart cities
Delosières et al. Infrastructure for detecting Android malware
Spreitzenbarth et al. Mastering python forensics
US20240338447A1 (en) Automated attack chain following by a threat analysis platform
US20240330454A1 (en) File analysis engines for identifying security-related threats
Ostrovskaya et al. Practical Memory Forensics: Jumpstart effective forensic analysis of volatile memory
Spreitzenbarth Dissecting the Droid: Forensic analysis of android and its malicious applications
Jaswal Mastering Metasploit
Le et al. A Basic Malware Analysis Process Based on FireEye Ecosystem.
Oberoi Androsat: Security analysis tool for android applications
Sindoni Toward a methodology for malware analysis and characterization for Machine Learning application
Fichera et al. Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response
Rudametkin Improving the Security and Privacy of the Web through Browser Fingerprinting
Hovmark et al. Towards Extending Probabilistic Attack Graphs with Forensic Evidence: An investigation of property list files in macOS
Tascon Gutierrez et al. Malware Sandbox Deployment, Analysis and Development