Blog Posts
Writing Effective YARA Signatures to Identify Malware
In previous blog posts, I have written about applying similarity measures to malicious code to identify related files and reduce analysis expense. Another way to observe similarity in malicious code …
• By David French
In Reverse Engineering for Malware Analysis
Fuzzy Hashing Against Different Types of Malware
Malware, which is short for "malicious software," is a growing problem for government and commercial organizations since it disrupts or denies important operations, gathers private information without consent, gains unauthorized …
• By David French
In Reverse Engineering for Malware Analysis
Fuzzy Hashing Techniques in Applied Malware Analysis
Malware--generically defined as software designed to access a computer system without the owner's informed consent--is a growing problem for government and commercial organizations. In recent years, research into malware focused …