April 11, 2022, 1:20 a.m. | Vasilis Vouvoutsis, Fran Casino, Constantinos Patsakis

cs.CR updates on arXiv.org arxiv.org

Malware authors are continuously evolving their code base to include
counter-analysis methods that can significantly hinder their detection and
blocking. While the execution of malware in a sandboxed environment may provide
a lot of insightful feedback about what the malware actually does in a machine,
anti-virtualisation and hooking evasion methods may allow malware to bypass
such detection methods. The main objective of this work is to complement
sandbox execution with the use of binary emulation frameworks. The core idea is …

binary classification malware malware classification

Senior Manager, Response Analytics & Insights (Fraud Threat Management)

@ Scotiabank | Toronto, ON, CA, M3C0N5

Cybersecurity Risk Analyst IV

@ Computer Task Group, Inc | Buffalo, NY, United States

Information System Security Engineer (ISSE) – Risk Management Framework (RMF), AWS, ACAS, ESS.

@ ARA | Raleigh, North Carolina, United States

2024 Fall Cybersecurity Engineering Intern | Novi, MI

@ Dana Incorporated | Novi, MI, US, 48377

Consultant Sharepoint

@ Talan | Luxembourg, Luxembourg

Senior Information Systems Security Officer (ISSO) - onsite Tucson, AZ

@ RTX | AZ842: RMS AP Bldg 842 1151 East Hermans Road Building 842, Tucson, AZ, 85756 USA