搜索资源列表
Network_Security
- Detecting Network Intrusions via Sampling_A Game Theoretic Approach Internet Quarantine_Requirements for Containing Self-Propagating Code Modeling Malware Spreading Dynamics Modeling the Spread of Active Worms
Malware
- 计算机病毒讲座,英文的,一个老外讲的,很好的资料。-Computer viruses lectures, in English, a foreign-speaking, and good information.
5
- Executing malware in a controlled environment is one of the most popular and effective methods of extracting the behavior characters of malware. In this paper, we propose a dynamic analysis technique to explore the different behaviors of malw
Introduction-to-File-Infection-Techniques
- This paper was written within the scope of the author´ s own learning process, during her studies of computer science and on the basis of her own malware analyses. It was published in order to offer an introduction to several file infection t
AMC
- Malware Classifer J48 Decision Tr-Malware Classifer J48 Decision Tree
SyScan2013_DAY1_SPEAKER03_Nguyen_Anh_Quynh_Optico
- OptiCode: Machine Code Deobfuscation for Malware Analysis Nguyen Anh Quynh, COSEINC <aquynh -at- gmail.com> Syscan Singapore 2013, April 25th
2
- Volume issue 2013 [doi 10.1145_2513228.2513294] K. Han J. H. Lim E. G. Im -- Malware analysis method using visualization of binary files.pdf- Volume issue 2013 [doi 10.1145_2513228.2513294] K. Han J. H. Lim E. G. Im -- Malware analysis method usin
360toolstck
- 三百六杀毒防*和*恶意软件....希望可以帮到大家-Three hundred sixty anti-virus plug-and trojan malware .... hope you can help us
auto-reversing-of-mal-emulator
- Malware authors have recently begun using emulation technology to obfuscate their code.In this paper, we present the first work in automatic reverse engineering of malware emulators.-Automatic Reverse Engineering of Malware Emulators
ClusterMalwareWithKmeans
- Partitional Clustering of Malware using K-Means
Sun
- Malware Packer Analysis Using Information Theory and Statistical Methods
goddless-mobile-malware-uses-multiple-exploits-to
- goddless mobile device security
web-malware
- Vulnerability detection tools are frequently considered the silver-bullet for detecting vulnerabilities in web services. However, research shows that the effectiveness of most of those tools is very low and that using the wrong tool may lead
Chapter 0-1
- Malware Analysis book is a guide to do reverse engineering malware
Chapter 2-3
- Malware Analysis book is a guide to do reverse engineering malware 2
Chapter 4-5
- Malware Analysis book is a guide to do reverse engineering malware 3
Chapter 6-7
- Malware Analysis book is a guide to do reverse engineering malware 4
Chapter 8-9
- Malware Analysis book is a guide to do reverse engineering malware 5
Chapter 10-11
- Malware Analysis book is a guide to do reverse engineering malware 6
kuzzle
- “Kuzzle”通过篡改电脑系统中的主引导记录(MBR)和卷引导记录(VBR),在不修复主引导区情况下,用户即使重装系统也无法根除。火绒工程师表示,近几年,通过MBR、VBR感染进行深度技术对抗的病毒和流氓软件逐渐增多,流氓软件已完全病毒化,越来越多的使用病毒技术,其手段强劲、性质恶劣,对用户的危害甚至超过传统病毒。("Kuzzle" can tamper with the main boot record (MBR) and volume boot record (VBR)