Explore a base level problem in static malware analysis, that we have too many samples to analyze, by leveraging the parallelization of GPGPUs — an advantage is gained by moving the problem into the visual plane and solving similarity by texture analysis in parallel.
I’ve clustered a few hundred million PEs by organizing them by how the “look.” Debugging is accompanied by making movies of the visualization. The real utility of the art is speed. A malware sample can be analyzed on an average of 33 milliseco
124 views
0
0
1 year ago 00:10:31 1
ШПИОНЫ в Android / УБИЙЦА антивирусов на Rust / Зачем ЧИТАТЬ отчёты? / BM5
1 year ago 00:09:03 1
Reversing - .NET main is not the first thing executed
2 years ago 01:25:42 14
Reverse Engineering/Game Patching Tutorial: Full Res Roller Coaster Tycoon with Ghidra+x64dbg+Python
2 years ago 00:38:03 1
A New Trend for the Blue Team: Using a Symbolic Engine to Detect Evasive Forms of Malware/Ransomware