Advanced Malware Analysis

This module explores advanced malware analysis, focusing on the dissection and examination of malicious software to understand its origins, functionality, and impact on information systems.

Portal > Cybersecurity > Advanced Malware Analysis

Curriculum Builder

Sikorski and Honig. “Practical Malware Analysis,” No Starch Press, 2012. ISBN-13: 978-1-59327-290-6

Sun, M., Wei, T., and J. C. Lui. “Taintart: A practical multi-level information-flow tracking system for android runtime.” In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2016.10.1145/2976749.2978343.

Lee, J. & Avgerinos, T. and D. Brumley, D. “Tie: Principled reverse engineering of types in binary programs.” In Proc. 18th Annual Network and Distributed System Security Symposium, 2021

Sharif, Monirul& Lanzi, Andrea & Giffin, Jonathon and Wenke Lee. “Automatic Reverse Engineering of Malware Emulators.” In Proceedings of the IEEE Symposium on Security and Privacy, 2009. 10.1109/SP.2009.27.

Coogan, Kevin & Lu, Gen and Saumya Debray. “Deobfuscation of Virtualization-Obfuscated Software A Semantics-Based Approach.” CCS’11: Proceedings of the 18th ACM Conference on Computer and communications security, 2011. https://doi.org/10.1145/2046707.2046739

L. He et al. “Automatically assessing crashes from heap overflows.” In 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2017.

Egele, M., Scholte, T., Kirda, E., and C. Kruegel, C. “A survey on automated dynamic malware-analysis techniques and tools.” ACM Computing Surveys, 44(2), 1-42, 2012.

Shin, Seugwon and Guofei Gu. “Conficker and beyond: a large-scale empirical study.” Proceedings of the 26th Annual Computer Security Applications Conference (pp. 151-160). ACM, 2010. Retrieved from http://portal.acm.org/citation.cfm?id=1920285

IEEE. “Malicious PDF Documents Explained.” IEEE Security Privacy Magazine, 2011. Retrieved from http://www.computer.org/portal/web/csdl/doi/10.1109/MSP.2011.14

IEEE. “A heuristic approach for detection of obfuscated malware.” 2009 IEEE International Conference on Intelligence and Security Informatics, 2009. Retrieved from http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5137328