Mots-clés
malware
sandbox
malware analysis
information security
ransomware
safety system
safety
industrial
ics
triton
hacking
evasion techniques
cryptominers
rat
reverse engineering
threat
it security
encryption
shadow broker
security
wannacry
virus
reverse
forensic
dfir
windows
rootkit
debug
kernel
cuckoo
Tout plus
Présentations
(8)J’aime
(4)Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bugs in Modern Malware.
Maksim Shudrak
•
il y a 5 ans
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machine Learning
Malachi Jones
•
il y a 6 ans
Bug hunting through_reverse_engineering
arif
•
il y a 6 ans
Reverse Engineering Malware: A look inside Operation Tovar
Lancope, Inc.
•
il y a 9 ans
Mots-clés
malware
sandbox
malware analysis
information security
ransomware
safety system
safety
industrial
ics
triton
hacking
evasion techniques
cryptominers
rat
reverse engineering
threat
it security
encryption
shadow broker
security
wannacry
virus
reverse
forensic
dfir
windows
rootkit
debug
kernel
cuckoo
Tout plus