Get a Pentest and security assessment of your IT network.

News

Black Hat Asia 2015: Target: Malware

Malware commonly turns to API-wrapping techniques to obfuscate API calls, which makes it difficult to reverse-engineer the code. API Deobfuscator: Identifying Runtime-Obfuscated API Calls via Memory Access Analysis will detail just such a scheme, which can generate maps between obfuscated API calls and their true invocations. Android’s become another hot frontier in the fight against malware, and static and dynamic analysis tools have been created in response to Android malware’s increasingly complex defensive measures.”]

Source: https://www.darkreading.com/black-hat/black-hat-asia-2015-target-malware/d/d-id/1319228

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

RasGas, The Second Victim!

News

Technical analysis of the Locker virus on mobile phones