Blog Posts
What Ant Colonies Can Teach Us About Securing the Internet
In cyber systems, the identities of devices can easily be spoofed and are frequent targets of cyber-attacks. Once an identity is fabricated, stolen or spoofed it may be used as …
• By William Casey
In Artificial Intelligence Engineering
Provenance Inference in Software
Code clones are implementation patterns transferred from program to program via copy mechanisms including cut-and-paste, copy-and-paste, and code-reuse. As a software engineering practice there has been significant debate about the …
• By William Casey
In Reverse Engineering for Malware Analysis
Deterrence for Malware: Towards a Deception-Free Internet
Exclusively technical approaches toward attaining cyber security have created pressures for malware attackers to evolve technical sophistication and harden attacks with increased precision, including socially engineered malware and distributed denial …
• By William Casey
In Reverse Engineering for Malware Analysis
Modeling Malware with Suffix Trees
Through our work in cyber security, we have amassed millions of pieces of malicious software in a large malware database called the CERT Artifact Catalog. Analyzing this code manually for …
• By William Casey
In Reverse Engineering for Malware Analysis
A New Approach to Modeling Malware using Sparse Representation
Malicious software (known as "malware") is increasingly pervasive with a constant influx of new, increasingly complex strains that wreak havoc by exploiting computers or personal and business information stored therein …