all InfoSec news
Malware Analysis with Symbolic Execution and Graph Kernel. (arXiv:2204.05632v1 [cs.CR])
April 13, 2022, 1:20 a.m. | Charles-Henry Bertrand Van Ouytsel, Axel Legay
cs.CR updates on arXiv.org arxiv.org
Malware analysis techniques are divided into static and dynamic analysis.
Both techniques can be bypassed by circumvention techniques such as
obfuscation. In a series of works, the authors have promoted the use of
symbolic executions combined with machine learning to avoid such traps. Most of
those works rely on natural graph-based representations that can then be
plugged into graph-based learning algorithms such as Gspan. There are two main
problems with this approach. The first one is in the cost of …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
PMO Cybersécurité H/F
@ Hifield | Sèvres, France
Third Party Risk Management - Consultant
@ KPMG India | Bengaluru, Karnataka, India
Consultant Cyber Sécurité H/F - Strasbourg
@ Hifield | Strasbourg, France
Information Security Compliance Analyst
@ KPMG Australia | Melbourne, Australia
GDS Consulting - Cyber Security | Data Protection Senior Consultant
@ EY | Taguig, PH, 1634
Senior QA Engineer - Cloud Security
@ Tenable | Israel