Etiquetas
malware
sandbox
malware analysis
information security
ransomware
safety system
safety
industrial
ics
triton
hacking
evasion techniques
cryptominers
rat
reverse engineering
threat
it security
encryption
shadow broker
security
wannacry
virus
reverse
forensic
dfir
windows
rootkit
debug
kernel
cuckoo
Ver más
Presentaciones
(8)Documentos
(2)Recomendaciones
(4)Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bugs in Modern Malware.
Maksim Shudrak
•
Hace 5 años
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machine Learning
Malachi Jones
•
Hace 6 años
Bug hunting through_reverse_engineering
arif
•
Hace 6 años
Reverse Engineering Malware: A look inside Operation Tovar
Lancope, Inc.
•
Hace 9 años
Etiquetas
malware
sandbox
malware analysis
information security
ransomware
safety system
safety
industrial
ics
triton
hacking
evasion techniques
cryptominers
rat
reverse engineering
threat
it security
encryption
shadow broker
security
wannacry
virus
reverse
forensic
dfir
windows
rootkit
debug
kernel
cuckoo
Ver más