Complex malware samples feature measures to impede automatic and manual analyses, making their investigation cumbersome. While automatic characterization of malware benefits from recently proposed designs for passive monitoring, the subsequent dissection process still sees human analysts struggling...
Malware Analysis
-
-
Dynamic binary instrumentation (DBI) techniques allow for monitoring and possibly altering the execution of a running program up to the instruction level granularity. The ease of use and flexibility of DBI primitives has made them popular in a large body of research in different domains, including...
-
Dynamic binary instrumentation (DBI) systems are a popular solution for prototyping heterogeneous program analyses and monitoring tools. Several works from academic and practitioner venues have questioned the transparency of DBI systems, with anti-analysis detection sequences being found already in...
-
-
-
The vast majority of today's mobile malware targets Android devices. An important task of malware analysis is the classification of malicious samples into known families. In this paper we propose AndroDFA: an approach to Android malware family classification based on dynamic analysis of resource...
-
The skyrocketing grow rate of new malware brings novel challenges to protect computers and networks. Discerning truly novel malware from variants of known samples is a way to keep pace with this trend. This can be done by grouping known malware in families by similarity and classifying new samples...
-
In the past, malware used to integrate multiple malicious functions inside the one executable. So that if there are lots of suspicious functions inside an executable, the antivirus will say it was a malware with high confidence. In order to reduce the attention of anti-virus, hackers separate...
-
The cybersecurity group is a multidisciplinary team of researchers that collates several knowledge areas and apply them to scientific problems in the context of IT security. The team works on several diverse topics related to cybersecurity, including:
Attack modeling...
-