A significant number of logs are generated in dynamic malware analysis. Consequently, a method for effectively compressing these logs is required to reduce the amount of memory and storage consumed to store such logs. In this study, we evaluated the efficacy of grammar compression methods in compressing call traces in malware analysis logs. We hypothesized that grammar compression can be useful in compressing call traces because its algorithm can naturally express the dynamic control flows of program execution. We measured the compression ratio of three grammar compression methods (SEQUITUR, Re-Pair, and Byte Pair Encoding (BPE)) and three well-known compressors (gzip, bzip2, and xz). In experiments conducted in which API call sequences col...
Malware analysis process is being categorized into static analysis and dynamic analysis. Both static...
Several software maintenance tasks such as debugging, phase-identification, or simply the high-level...
Scareware is a recent type of malicious software that may pose financial and privacy-related threats...
Lossless compression of memory dumps from virtual machines that run malware samples is considered wi...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
The ramping up use of network connected devices is providing hackers more incentives and opportuniti...
With the move towards global and multi-national companies, information technology infrastructure req...
A program execution trace is essentially a collection of information on what happened while a given ...
Part 3: FORENSIC TECHNIQUESInternational audienceClassical intrusion analysis of network log files u...
Polymorphic and metamorphic malware use code obfuscation techniques to construct new variants which ...
Software monitoring and debugging can be efficiently supported by one of the concurrent error detect...
Malware brings constant threats to the services and facilities used by modern society. In order to p...
The battle between malware developers and security analysts continues, and the number of malware and...
N-gram analysis is an approach that investigates the structure of a program using bytes, characters ...
The talk focused on a grammar-based technique for identifying redundancy in program code and taking ...
Malware analysis process is being categorized into static analysis and dynamic analysis. Both static...
Several software maintenance tasks such as debugging, phase-identification, or simply the high-level...
Scareware is a recent type of malicious software that may pose financial and privacy-related threats...
Lossless compression of memory dumps from virtual machines that run malware samples is considered wi...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
The ramping up use of network connected devices is providing hackers more incentives and opportuniti...
With the move towards global and multi-national companies, information technology infrastructure req...
A program execution trace is essentially a collection of information on what happened while a given ...
Part 3: FORENSIC TECHNIQUESInternational audienceClassical intrusion analysis of network log files u...
Polymorphic and metamorphic malware use code obfuscation techniques to construct new variants which ...
Software monitoring and debugging can be efficiently supported by one of the concurrent error detect...
Malware brings constant threats to the services and facilities used by modern society. In order to p...
The battle between malware developers and security analysts continues, and the number of malware and...
N-gram analysis is an approach that investigates the structure of a program using bytes, characters ...
The talk focused on a grammar-based technique for identifying redundancy in program code and taking ...
Malware analysis process is being categorized into static analysis and dynamic analysis. Both static...
Several software maintenance tasks such as debugging, phase-identification, or simply the high-level...
Scareware is a recent type of malicious software that may pose financial and privacy-related threats...