This module explores advanced malware analysis, focusing on the dissection and examination of malicious software to understand its origins, functionality, and impact on information systems.
Sikorski and Honig. “Practical Malware Analysis,” No Starch Press, 2012. ISBN-13: 978-1-59327-290-6
Sun, M., Wei, T., and J. C. Lui. “Taintart: A practical multi-level information-flow tracking system for android runtime.” In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2016.10.1145/2976749.2978343.
Lee, J. & Avgerinos, T. and D. Brumley, D. “Tie: Principled reverse engineering of types in binary programs.” In Proc. 18th Annual Network and Distributed System Security Symposium, 2021
Sharif, Monirul& Lanzi, Andrea & Giffin, Jonathon and Wenke Lee. “Automatic Reverse Engineering of Malware Emulators.” In Proceedings of the IEEE Symposium on Security and Privacy, 2009. 10.1109/SP.2009.27.
Coogan, Kevin & Lu, Gen and Saumya Debray. “Deobfuscation of Virtualization-Obfuscated Software A Semantics-Based Approach.” CCS’11: Proceedings of the 18th ACM Conference on Computer and communications security, 2011. https://doi.org/10.1145/2046707.2046739
L. He et al. “Automatically assessing crashes from heap overflows.” In 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2017.
Egele, M., Scholte, T., Kirda, E., and C. Kruegel, C. “A survey on automated dynamic malware-analysis techniques and tools.” ACM Computing Surveys, 44(2), 1-42, 2012.
Shin, Seugwon and Guofei Gu. “Conficker and beyond: a large-scale empirical study.” Proceedings of the 26th Annual Computer Security Applications Conference (pp. 151-160). ACM, 2010. Retrieved from http://portal.acm.org/citation.cfm?id=1920285
IEEE. “Malicious PDF Documents Explained.” IEEE Security Privacy Magazine, 2011. Retrieved from http://www.computer.org/portal/web/csdl/doi/10.1109/MSP.2011.14
IEEE. “A heuristic approach for detection of obfuscated malware.” 2009 IEEE International Conference on Intelligence and Security Informatics, 2009. Retrieved from http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5137328
×
You have not selected any articles yet.
×
How the curriculum builder works
Make sure you select your site language before adding articles.
Choose a curriculum category.
Browse all the articles under the selected curriculum and add the ones you need to your list.
We use cookies to operate this website, improve useability, personalize your experience, and improve our marketing. Your privacy is important to us, and we will never sell your data.AcceptRejectPrivacy policy