This module explores advanced malware analysis, focusing on the dissection and examination of malicious software to understand its origins, functionality, and impact on information systems.
Sikorski and Honig. “Practical Malware Analysis,” No Starch Press, 2012. ISBN-13: 978-1-59327-290-6
Sun, M., Wei, T., and J. C. Lui. “Taintart: A practical multi-level information-flow tracking system for android runtime.” In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2016.10.1145/2976749.2978343.
Lee, J. & Avgerinos, T. and D. Brumley, D. “Tie: Principled reverse engineering of types in binary programs.” In Proc. 18th Annual Network and Distributed System Security Symposium, 2021
Sharif, Monirul& Lanzi, Andrea & Giffin, Jonathon and Wenke Lee. “Automatic Reverse Engineering of Malware Emulators.” In Proceedings of the IEEE Symposium on Security and Privacy, 2009. 10.1109/SP.2009.27.
Coogan, Kevin & Lu, Gen and Saumya Debray. “Deobfuscation of Virtualization-Obfuscated Software A Semantics-Based Approach.” CCS’11: Proceedings of the 18th ACM Conference on Computer and communications security, 2011. https://doi.org/10.1145/2046707.2046739
L. He et al. “Automatically assessing crashes from heap overflows.” In 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2017.
Egele, M., Scholte, T., Kirda, E., and C. Kruegel, C. “A survey on automated dynamic malware-analysis techniques and tools.” ACM Computing Surveys, 44(2), 1-42, 2012.
Shin, Seugwon and Guofei Gu. “Conficker and beyond: a large-scale empirical study.” Proceedings of the 26th Annual Computer Security Applications Conference (pp. 151-160). ACM, 2010. Retrieved from http://portal.acm.org/citation.cfm?id=1920285
IEEE. “Malicious PDF Documents Explained.” IEEE Security Privacy Magazine, 2011. Retrieved from http://www.computer.org/portal/web/csdl/doi/10.1109/MSP.2011.14
IEEE. “A heuristic approach for detection of obfuscated malware.” 2009 IEEE International Conference on Intelligence and Security Informatics, 2009. Retrieved from http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5137328
×
You have not selected any articles yet.
×
How the curriculum builder works
Make sure you select your site language before adding articles.
Choose a category and subcategory.
Browse all the resources under the selected subcategory and add the ones you need to your curriculum by ticking the box after the list item.
You can remove items from your curriculum by unticking the box after the list item.
You can go to a different category or subcategory using the navigation bar, adding as many resources to your curriculum as you need from across the portal. All added or removed items will be saved automatically.
You can see an overview of all selected curriculum items at any time by clicking on the “View curriculum” button.
To clear all items from the curriculum, click on the “Clear” button in the curriculum overview.
In the overview, you can add the name of the university, program, course, and lecturer. This information is not saved automatically, so you need to click “Save” before closing the overview.
To download your curriculum, click “Export PDF” in the overview. You must add and save your course information before downloading.
We use cookies to operate this website, improve useability, personalize your experience, and improve our marketing. Your privacy is important to us, and we will never sell your data.AcceptRejectPrivacy policy