Security analysts spend days or even weeks in trying to understand the inner workings of malicious software, using a plethora of manually orchestrated tools. Devising automated tools and techniques to assist and speed up the analysis process remains a major endeavor in computer security. While manual intervention will likely remain a key ingredient in the short and mid term, the recent advances in static and dynamic analysis techniques have the potential to significantly impact the malware analysis practice. In this paper we show how an analyst can use symbolic execution techniques to unveil critical behavior of a remote access trojan (RAT). Using a tool we implemented in the Angr framework, we analyze a sample drawn from a well-known RAT f...
Today’s world is connected through the Internet, everyone can connect eachother and people do busine...
Trojan Horse is the most powerful malware that can produce an attack to penetrate into the network e...
Many security and software testing applications require checking whether certain properties of a pro...
Security analysts spend days or even weeks in trying to understand the inner workings of malicious s...
The analysis of a malicious piece of software that involves a remote counterpart that instructs it c...
The ramping up use of network connected devices is providing hackers more incentives and opportuniti...
<div>Remote Access Trojan played a prominent role in many targeted cyber incidents throughout histor...
Modern software systems require the support of automatic program analyses to answer questions about ...
Today, malware threats are more dangerous than ever with thousand of new samples emerging everyday. ...
A Remote Administration Trojan (RAT) allows an attacker to remotely control a computing system and t...
ENGLISH: In this master’s thesis we show how we can use the Application Programming Interface (API) ...
In contrast to most benign applications, malware infects its host system. It does so via system-wide...
Malware infections have grown at least five-fold in the past five years. With an increase in IoT dev...
Many program analysis tools and techniques have been developed to assess program vulnerability. Yet,...
As software becomes increasingly embedded in our daily lives, it becomes more and more critical to f...
Today’s world is connected through the Internet, everyone can connect eachother and people do busine...
Trojan Horse is the most powerful malware that can produce an attack to penetrate into the network e...
Many security and software testing applications require checking whether certain properties of a pro...
Security analysts spend days or even weeks in trying to understand the inner workings of malicious s...
The analysis of a malicious piece of software that involves a remote counterpart that instructs it c...
The ramping up use of network connected devices is providing hackers more incentives and opportuniti...
<div>Remote Access Trojan played a prominent role in many targeted cyber incidents throughout histor...
Modern software systems require the support of automatic program analyses to answer questions about ...
Today, malware threats are more dangerous than ever with thousand of new samples emerging everyday. ...
A Remote Administration Trojan (RAT) allows an attacker to remotely control a computing system and t...
ENGLISH: In this master’s thesis we show how we can use the Application Programming Interface (API) ...
In contrast to most benign applications, malware infects its host system. It does so via system-wide...
Malware infections have grown at least five-fold in the past five years. With an increase in IoT dev...
Many program analysis tools and techniques have been developed to assess program vulnerability. Yet,...
As software becomes increasingly embedded in our daily lives, it becomes more and more critical to f...
Today’s world is connected through the Internet, everyone can connect eachother and people do busine...
Trojan Horse is the most powerful malware that can produce an attack to penetrate into the network e...
Many security and software testing applications require checking whether certain properties of a pro...