Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Dynamic Malware Analysis
biblio
MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware
Submitted by grigby1 on Fri, 08/14/2020 - 11:44am
orthogonal defense
global malware operations
law enforcement agencies
MALPITY
malware authors
malware families
malware spreading
malware tarpits
monetization techniques
command and control systems
POSIX
Sinkholing
Socket API
Tarpit
tarpit vulnerabilities
Unix
Winsock socket APIs
application programming interface
Dynamic Malware Analysis
Servers
pubcrawl
resilience
Resiliency
malware
invasive software
APIs
application program interfaces
Engines
Compositionality
network service
network operation
botnet
sockets
Grippers
botnet infrastructures
botnets
biblio
Static and Dynamic Malware Analysis Using Machine Learning
Submitted by aekwall on Mon, 06/24/2019 - 2:41pm
Internet oriented machines security
summary information
static malware analysis
static analysis
sandboxing
Resiliency
registry keys changed
pubcrawl
PEFILE
obfuscate
Metrics
malwares
malware
machine learning
learning (artificial intelligence)
invasive software
Malware Analysis
Human behavior
feature extraction
evade
Dynamic Malware Analysis
dynamic analysis
DLLs
Data mining
cuckoo sandbox
Classification algorithms
Binary
application program interfaces
APIs
privacy
Predictive Metrics
biblio
Dynamic malware analysis of phishing emails
Submitted by aekwall on Mon, 06/24/2019 - 2:41pm
potentially new malwares
Malware Analysis
malware authors
malware samples
Metrics
network communication
operating system
Phishing
phishing emails
malware
pubcrawl
Resiliency
Servers
Signature Generation
SPIM messages
standard analysis methodology
system monitoring
tools
digital signatures
anomaly signature
anti-malware
anti-virus products
automatic generation
complete dynamic analysis laboratory setting
comprehensive dynamic analysis
Computer crime
computer viruses
active signature
dynamic analysis laboratory setting
Dynamic Malware Analysis
Electronic mail
honeynet
Human behavior
internet
invasive software
biblio
Integration of Network Intrusion Detection Systems and Honeypot Networks for Cloud Security
Submitted by grigby1 on Wed, 05/09/2018 - 2:53pm
Malware Analysis
Snort
Signature-based detection
Servers
sandboxing environment
sandboxing
pubcrawl
Ports (Computers)
Policy-Governed systems
Policy-Governed Secure Collaboration
Policy
openstack
NIDS module
network intrusion detection systems
network intrusion detection system
Cloud Computing
malware
malicious attacks
invasive software
Intrusion Detection
honeypot networks
Honeypot Network
Dynamic Malware Analysis
cost services
computer architecture
composability
collaboration
cloud-computing technology
Cloud Security
cloud environment
biblio
Improving the effectiveness and efficiency of dynamic malware analysis with machine learning
Submitted by grigby1 on Tue, 01/23/2018 - 3:52pm
malware
static analysis
sandbox environment
Resiliency
pubcrawl
privacy
Predictive models
pattern classification
Metrics
malware detection
malware classification
Malware Analysis
Analytical models
machine learning
learning (artificial intelligence)
invasive software
information extraction
Human behavior
feature extraction
Dynamic Malware Analysis
dynamic malware
Data mining
Cybersecurity
computer security
biblio
Architecture for Resource-Aware VMI-based Cloud Malware Analysis
Submitted by grigby1 on Tue, 01/23/2018 - 3:52pm
Cloud Computing
Dynamic Malware Analysis
Human behavior
machine learning
Malware Analysis
Metrics
privacy
pubcrawl
Resiliency
virtual machine introspection