Dismiss this notice
Thor Foresight Home Halloween 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=8636

Dismiss this notice
Avast Premier Halloween 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=8637

Dismiss this notice
Kryptel Standard Halloween 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=8635

Dismiss this notice
Driver Easy Professional Halloween 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=8634

Dismiss this notice
O&O Software Halloween 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=8633

Dismiss this notice
Ashampoo WinOptimizer 17 Halloween 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=8626

Dismiss this notice
AIDA64 Extreme Halloween 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=8625

Dismiss this notice
Ashampoo Movie Studio Pro 3 Halloween 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=8624

Dismiss this notice
AirVPN Halloween 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=8623

Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
VB2018 paper: Analysing compiled binaries using logic
#1
Lightbulb 
Quote:[Image: logo-big.png]


Static analysis of malware is usually "done by a person (a security analyst) who will stare at one binary code for hours, searching for patterns – the signatures," writes Thaís Moreira Hamasaki in her VB2018 paper.

To make the analysis process faster and more effective, analysts tend to use various tools and techniques. One lesser known technique that is becoming increasingly popular among malware analysts is constraint programming, which gives insight into the conditions necessary for the execution to take specific branches.

[Image: 2c5b2567a6332ca4c870b1710708bbdd_f3129.jpg]

In her detailed VB2018 paper, Thaís (who was then at F-Secure) presented an overview of constraint programming and explained how it can be applied to the analysis of (potentially) malicious binaries. Today we have published Thaís' paper in both HTML and PDF format. We have also uploaded the video of her presentation to our YouTube channel.

Analysing compiled binaries using logic


Read the paper (HTML)
Download the paper (PDF)
Full Reading
[-] The following 2 users Like harlan4096's post:
  • darktwilight, silversurfer
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username:


Password:





[-]
Recent Posts
GFYI [Official] AIDA64 Extreme Hallowee...
Thanks a lot for the...dinosaur07 — 22:37
GFYI [Official] Driver Easy Professiona...
Thanks a lot for the...dinosaur07 — 22:28
GFYI [Official] Avast Premier Halloween...
Congratulations to t...ismail — 21:53
GFYI [Official] Ashampoo WinOptimizer 1...
Congrats to the winn...ismail — 21:52
GFYI [Official] Ashampoo Movie Studio P...
Congratulations to t...ismail — 21:50

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (51)Stefanos

[-]
Online Staff
There are no staff members currently online.

>