welcome: please sign in

Upload page content

You can upload content for the page named below. If you change the page name, you can also upload content for another page. If the page name is empty, we derive the page name from the file name.

File to load page content from
Page name
Comment

location: MirceaPrejban

Pattern-driven malware detection in native executables based on control-flow graphs

Mircea Prejban

Abstract: Malware becomes more sophisticated by having additional functionalities for persistence, evasion, stealth and anti-reverse engineering properties. For malware the best method of understanding the threat is by malware analysis in which the analyst extracts code and data or runs the malware in a safe environment to understand how the malware program functions. Software solutions require additional ways to detect and stop malware as now we cannot rely exclusively on hash signature based detection and by automating static analysis we can construct additional ways of spotting malicious programs. In this seminar we present the usage of Control-Flow-Graph in malware detection and some insights for our custom approach of a malware detection method based on pattern matching and control-flow graphs.