SlideShare uma empresa Scribd logo
1 de 7
Dr. Andrew Walenstein
axw8185@louisiana.ed




 Computer Science
Research Focus
Research Focus
• Research in software
  engineering and human-
  computer interaction

• Current focus on malicious
  software analysis and cyber
  warfare

• The aforementioned topic
  deals with identifying and
  defending against malware
  that attacks users to
  compromise their
  information.
Abstract Summary

BlackHat hackers are the villains of computer technology. The malware that they
write is very harmful to average computer users. It seeks to compromise their
systems and personal information. The purpose of the research done in this
project is to create an automated way for WhiteHats (the good guys) to detect
and defend against malware that is derived from previous versions of harmful
software by changing a very little amount of code. By successfully comparing
malicious programs and finding matches, new, non-innovative variations of
malware can be easily defeated.


                                Bottom Line

 All of the research done by Dr. Walenstein is done with the hopes of making
 the experience of using a computer, and the Internet, safer.
Exploiting Similarity Between
            Variants to Defeat Malware

                           Abstract Summary

BlackHat hackers are the villains of computer technology. The malware that they
write is very harmful to average computer users. It seeks to compromise their
systems and personal information. The purpose of the research done in this
project is to create an automated way for WhiteHats (the good guys) to detect
and defend against malware that is derived from previous versions of harmful
software by changing a very little amount of code. By successfully comparing
malicious programs and finding matches, new, non-innovative variations of
malware can be easily defeated.


                                Bottom Line

 All of the research done by Dr. Walenstein is done with the hopes of making
 the experience of using a computer, and the Internet, safer.
Created by:


Jeffery L. Jackson, Jr.
       October 19, 2011

Mais conteúdo relacionado

Destaque

Trust and Influence in the Complex Network of Social Media
Trust and Influence in the Complex Network of Social MediaTrust and Influence in the Complex Network of Social Media
Trust and Influence in the Complex Network of Social MediaTeradata Aster
 
Cultura de Métricas para SEO (UaiSEO)
Cultura de Métricas para SEO (UaiSEO)Cultura de Métricas para SEO (UaiSEO)
Cultura de Métricas para SEO (UaiSEO)Leonardo Naressi
 
Customer or Product? ownership and control of personal data
Customer or Product? ownership and control of personal dataCustomer or Product? ownership and control of personal data
Customer or Product? ownership and control of personal dataPrivate Consultants
 
Web Analytics no TcheSEO 2011
Web Analytics no TcheSEO 2011Web Analytics no TcheSEO 2011
Web Analytics no TcheSEO 2011Leonardo Naressi
 
Social Media Metrics Definitions
Social Media Metrics DefinitionsSocial Media Metrics Definitions
Social Media Metrics DefinitionsLeonardo Naressi
 
Search Intelligence - Social Media e Search Marketing - Proxxima 2011
Search Intelligence - Social Media e Search Marketing - Proxxima 2011Search Intelligence - Social Media e Search Marketing - Proxxima 2011
Search Intelligence - Social Media e Search Marketing - Proxxima 2011Leonardo Naressi
 
Civil & Construction Eng. Curtin University Certificate
Civil & Construction Eng. Curtin University CertificateCivil & Construction Eng. Curtin University Certificate
Civil & Construction Eng. Curtin University CertificateKundai Dennis Musuka
 
Gost r standards 2324
Gost r standards 2324Gost r standards 2324
Gost r standards 2324Quinn Kane
 
6ª Manoca do Canto Gaúcho Fase Local
6ª Manoca do Canto Gaúcho Fase Local6ª Manoca do Canto Gaúcho Fase Local
6ª Manoca do Canto Gaúcho Fase Localmanocadocantogaucho
 
Brightside App...every-click
Brightside App...every-clickBrightside App...every-click
Brightside App...every-clickNEADApps
 
KFIE Innovator Bios
KFIE Innovator BiosKFIE Innovator Bios
KFIE Innovator BiosGiselle Aris
 
Resume of Josh Cannon
Resume of Josh CannonResume of Josh Cannon
Resume of Josh CannonJosh Cannon
 
Mi0034 database management system
Mi0034   database management systemMi0034   database management system
Mi0034 database management systemStudy Stuff
 
Communication Online
Communication OnlineCommunication Online
Communication Onlinekraemera
 
3 Reasons You Should Get into Gardening
3 Reasons You Should Get into Gardening3 Reasons You Should Get into Gardening
3 Reasons You Should Get into GardeningAngelo Di Meglio
 

Destaque (20)

Trust and Influence in the Complex Network of Social Media
Trust and Influence in the Complex Network of Social MediaTrust and Influence in the Complex Network of Social Media
Trust and Influence in the Complex Network of Social Media
 
Você é carente de quê?
Você é carente de quê?Você é carente de quê?
Você é carente de quê?
 
Cultura de Métricas para SEO (UaiSEO)
Cultura de Métricas para SEO (UaiSEO)Cultura de Métricas para SEO (UaiSEO)
Cultura de Métricas para SEO (UaiSEO)
 
Customer or Product? ownership and control of personal data
Customer or Product? ownership and control of personal dataCustomer or Product? ownership and control of personal data
Customer or Product? ownership and control of personal data
 
Web Analytics no TcheSEO 2011
Web Analytics no TcheSEO 2011Web Analytics no TcheSEO 2011
Web Analytics no TcheSEO 2011
 
desfile01
desfile01desfile01
desfile01
 
Social Media Metrics Definitions
Social Media Metrics DefinitionsSocial Media Metrics Definitions
Social Media Metrics Definitions
 
Marival Vacation Club
Marival Vacation ClubMarival Vacation Club
Marival Vacation Club
 
A Vendinha Da Esquina
A Vendinha Da EsquinaA Vendinha Da Esquina
A Vendinha Da Esquina
 
Search Intelligence - Social Media e Search Marketing - Proxxima 2011
Search Intelligence - Social Media e Search Marketing - Proxxima 2011Search Intelligence - Social Media e Search Marketing - Proxxima 2011
Search Intelligence - Social Media e Search Marketing - Proxxima 2011
 
Civil & Construction Eng. Curtin University Certificate
Civil & Construction Eng. Curtin University CertificateCivil & Construction Eng. Curtin University Certificate
Civil & Construction Eng. Curtin University Certificate
 
Gost r standards 2324
Gost r standards 2324Gost r standards 2324
Gost r standards 2324
 
6ª Manoca do Canto Gaúcho Fase Local
6ª Manoca do Canto Gaúcho Fase Local6ª Manoca do Canto Gaúcho Fase Local
6ª Manoca do Canto Gaúcho Fase Local
 
past simple
past simplepast simple
past simple
 
Brightside App...every-click
Brightside App...every-clickBrightside App...every-click
Brightside App...every-click
 
KFIE Innovator Bios
KFIE Innovator BiosKFIE Innovator Bios
KFIE Innovator Bios
 
Resume of Josh Cannon
Resume of Josh CannonResume of Josh Cannon
Resume of Josh Cannon
 
Mi0034 database management system
Mi0034   database management systemMi0034   database management system
Mi0034 database management system
 
Communication Online
Communication OnlineCommunication Online
Communication Online
 
3 Reasons You Should Get into Gardening
3 Reasons You Should Get into Gardening3 Reasons You Should Get into Gardening
3 Reasons You Should Get into Gardening
 

Semelhante a Univ 100 research presentation

Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Deb Birch
 
Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware IOSR Journals
 
Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....Research Publish Journals (Publisher)
 
X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceIJECEIAES
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksDiane M. Metcalf
 
Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Softwar...
Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Softwar...Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Softwar...
Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Softwar...lephuocthinh2
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docxdrennanmicah
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer VandalismAditya Singh
 
Analysis of field data on web security vulnerabilities
Analysis of field data on web security vulnerabilities Analysis of field data on web security vulnerabilities
Analysis of field data on web security vulnerabilities Papitha Velumani
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Satria Ady Pradana
 
Top 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdfTop 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdfDipak Tiwari
 
Fighting computer viruses
Fighting computer virusesFighting computer viruses
Fighting computer virusesNguyễn Anh
 
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...IJNSA Journal
 

Semelhante a Univ 100 research presentation (20)

Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
 
Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware
 
Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....
 
X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligence
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Softwar...
Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Softwar...Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Softwar...
Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Softwar...
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
 
eForensics_17_2013_KMOKER
eForensics_17_2013_KMOKEReForensics_17_2013_KMOKER
eForensics_17_2013_KMOKER
 
Analysis of field data on web security vulnerabilities
Analysis of field data on web security vulnerabilities Analysis of field data on web security vulnerabilities
Analysis of field data on web security vulnerabilities
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
Top 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdfTop 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdf
 
Fighting computer viruses
Fighting computer virusesFighting computer viruses
Fighting computer viruses
 
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
 

Último

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

Univ 100 research presentation

  • 1.
  • 4. Research Focus • Research in software engineering and human- computer interaction • Current focus on malicious software analysis and cyber warfare • The aforementioned topic deals with identifying and defending against malware that attacks users to compromise their information.
  • 5. Abstract Summary BlackHat hackers are the villains of computer technology. The malware that they write is very harmful to average computer users. It seeks to compromise their systems and personal information. The purpose of the research done in this project is to create an automated way for WhiteHats (the good guys) to detect and defend against malware that is derived from previous versions of harmful software by changing a very little amount of code. By successfully comparing malicious programs and finding matches, new, non-innovative variations of malware can be easily defeated. Bottom Line All of the research done by Dr. Walenstein is done with the hopes of making the experience of using a computer, and the Internet, safer.
  • 6. Exploiting Similarity Between Variants to Defeat Malware Abstract Summary BlackHat hackers are the villains of computer technology. The malware that they write is very harmful to average computer users. It seeks to compromise their systems and personal information. The purpose of the research done in this project is to create an automated way for WhiteHats (the good guys) to detect and defend against malware that is derived from previous versions of harmful software by changing a very little amount of code. By successfully comparing malicious programs and finding matches, new, non-innovative variations of malware can be easily defeated. Bottom Line All of the research done by Dr. Walenstein is done with the hopes of making the experience of using a computer, and the Internet, safer.
  • 7. Created by: Jeffery L. Jackson, Jr. October 19, 2011

Notas do Editor

  1. \n\n
  2. \n\n
  3. \n\n
  4. \n\n
  5. \n\n
  6. \n\n
  7. \n\n
  8. \n\n
  9. \n\n
  10. \n\n