lkpbible.blogg.se

Pestudio on an img file
Pestudio on an img file







pestudio on an img file

He has been involved in the CIKM conference for many years, and has recently turned his attention to the problems of malware analysis “in the large”. About the presenter Charles Nicholas is a Professor of Computer Science at UMBC.CIKM is by no means a computer security conference, but knowledge of malware analysis may be useful to data scientists at any level of experience, and there are research issues in malware analysis that pertain to data science. We do not expect attendees to have any prior experience with malware analysis or cyber in general. Target audience, prerequisites, and benefits The intended audience will be those with some knowledge of database or IR, and computer systems in general. We will conclude with our view of important research questions in the field. We will discuss cluster analysis, malware attribution, and the problems caused by polymorphic malware. Concepts and tools from static and binary analysis will be discussed. The most popular tools used for analyzing malicious binaries will be presented and demonstrated, including IDA, Binary Ninja, and 圆4dbg. We discuss the various types of malware, including executable binaries, malicious PDFs, and exploit kits. Length: half-day, i.e., 3 hours plus breaksĪn overview of the field of malware analysis with emphasis on issues related to data science.









Pestudio on an img file