SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Dr. Andrew Walenstein
axw8185@louisiana.ed




 Computer Science
Research Focus
Research Focus
• Research in software
  engineering and human-
  computer interaction

• Current focus on malicious
  software analysis and cyber
  warfare

• The aforementioned topic
  deals with identifying and
  defending against malware
  that attacks users to
  compromise their
  information.
Abstract Summary

BlackHat hackers are the villains of computer technology. The malware that they
write is very harmful to average computer users. It seeks to compromise their
systems and personal information. The purpose of the research done in this
project is to create an automated way for WhiteHats (the good guys) to detect
and defend against malware that is derived from previous versions of harmful
software by changing a very little amount of code. By successfully comparing
malicious programs and finding matches, new, non-innovative variations of
malware can be easily defeated.


                                Bottom Line

 All of the research done by Dr. Walenstein is done with the hopes of making
 the experience of using a computer, and the Internet, safer.
Exploiting Similarity Between
            Variants to Defeat Malware

                           Abstract Summary

BlackHat hackers are the villains of computer technology. The malware that they
write is very harmful to average computer users. It seeks to compromise their
systems and personal information. The purpose of the research done in this
project is to create an automated way for WhiteHats (the good guys) to detect
and defend against malware that is derived from previous versions of harmful
software by changing a very little amount of code. By successfully comparing
malicious programs and finding matches, new, non-innovative variations of
malware can be easily defeated.


                                Bottom Line

 All of the research done by Dr. Walenstein is done with the hopes of making
 the experience of using a computer, and the Internet, safer.
Created by:


Jeffery L. Jackson, Jr.
       October 19, 2011

Weitere ähnliche Inhalte

Andere mochten auch

Trust and Influence in the Complex Network of Social Media
Trust and Influence in the Complex Network of Social MediaTrust and Influence in the Complex Network of Social Media
Trust and Influence in the Complex Network of Social MediaTeradata Aster
 
Cultura de Métricas para SEO (UaiSEO)
Cultura de Métricas para SEO (UaiSEO)Cultura de Métricas para SEO (UaiSEO)
Cultura de Métricas para SEO (UaiSEO)Leonardo Naressi
 
Customer or Product? ownership and control of personal data
Customer or Product? ownership and control of personal dataCustomer or Product? ownership and control of personal data
Customer or Product? ownership and control of personal dataPrivate Consultants
 
Web Analytics no TcheSEO 2011
Web Analytics no TcheSEO 2011Web Analytics no TcheSEO 2011
Web Analytics no TcheSEO 2011Leonardo Naressi
 
Social Media Metrics Definitions
Social Media Metrics DefinitionsSocial Media Metrics Definitions
Social Media Metrics DefinitionsLeonardo Naressi
 
Search Intelligence - Social Media e Search Marketing - Proxxima 2011
Search Intelligence - Social Media e Search Marketing - Proxxima 2011Search Intelligence - Social Media e Search Marketing - Proxxima 2011
Search Intelligence - Social Media e Search Marketing - Proxxima 2011Leonardo Naressi
 
Civil & Construction Eng. Curtin University Certificate
Civil & Construction Eng. Curtin University CertificateCivil & Construction Eng. Curtin University Certificate
Civil & Construction Eng. Curtin University CertificateKundai Dennis Musuka
 
Gost r standards 2324
Gost r standards 2324Gost r standards 2324
Gost r standards 2324Quinn Kane
 
6ª Manoca do Canto Gaúcho Fase Local
6ª Manoca do Canto Gaúcho Fase Local6ª Manoca do Canto Gaúcho Fase Local
6ª Manoca do Canto Gaúcho Fase Localmanocadocantogaucho
 
Brightside App...every-click
Brightside App...every-clickBrightside App...every-click
Brightside App...every-clickNEADApps
 
KFIE Innovator Bios
KFIE Innovator BiosKFIE Innovator Bios
KFIE Innovator BiosGiselle Aris
 
Resume of Josh Cannon
Resume of Josh CannonResume of Josh Cannon
Resume of Josh CannonJosh Cannon
 
Mi0034 database management system
Mi0034   database management systemMi0034   database management system
Mi0034 database management systemStudy Stuff
 
Communication Online
Communication OnlineCommunication Online
Communication Onlinekraemera
 
3 Reasons You Should Get into Gardening
3 Reasons You Should Get into Gardening3 Reasons You Should Get into Gardening
3 Reasons You Should Get into GardeningAngelo Di Meglio
 

Andere mochten auch (20)

Trust and Influence in the Complex Network of Social Media
Trust and Influence in the Complex Network of Social MediaTrust and Influence in the Complex Network of Social Media
Trust and Influence in the Complex Network of Social Media
 
Você é carente de quê?
Você é carente de quê?Você é carente de quê?
Você é carente de quê?
 
Cultura de Métricas para SEO (UaiSEO)
Cultura de Métricas para SEO (UaiSEO)Cultura de Métricas para SEO (UaiSEO)
Cultura de Métricas para SEO (UaiSEO)
 
Customer or Product? ownership and control of personal data
Customer or Product? ownership and control of personal dataCustomer or Product? ownership and control of personal data
Customer or Product? ownership and control of personal data
 
Web Analytics no TcheSEO 2011
Web Analytics no TcheSEO 2011Web Analytics no TcheSEO 2011
Web Analytics no TcheSEO 2011
 
desfile01
desfile01desfile01
desfile01
 
Social Media Metrics Definitions
Social Media Metrics DefinitionsSocial Media Metrics Definitions
Social Media Metrics Definitions
 
Marival Vacation Club
Marival Vacation ClubMarival Vacation Club
Marival Vacation Club
 
A Vendinha Da Esquina
A Vendinha Da EsquinaA Vendinha Da Esquina
A Vendinha Da Esquina
 
Search Intelligence - Social Media e Search Marketing - Proxxima 2011
Search Intelligence - Social Media e Search Marketing - Proxxima 2011Search Intelligence - Social Media e Search Marketing - Proxxima 2011
Search Intelligence - Social Media e Search Marketing - Proxxima 2011
 
Civil & Construction Eng. Curtin University Certificate
Civil & Construction Eng. Curtin University CertificateCivil & Construction Eng. Curtin University Certificate
Civil & Construction Eng. Curtin University Certificate
 
Gost r standards 2324
Gost r standards 2324Gost r standards 2324
Gost r standards 2324
 
6ª Manoca do Canto Gaúcho Fase Local
6ª Manoca do Canto Gaúcho Fase Local6ª Manoca do Canto Gaúcho Fase Local
6ª Manoca do Canto Gaúcho Fase Local
 
past simple
past simplepast simple
past simple
 
Brightside App...every-click
Brightside App...every-clickBrightside App...every-click
Brightside App...every-click
 
KFIE Innovator Bios
KFIE Innovator BiosKFIE Innovator Bios
KFIE Innovator Bios
 
Resume of Josh Cannon
Resume of Josh CannonResume of Josh Cannon
Resume of Josh Cannon
 
Mi0034 database management system
Mi0034   database management systemMi0034   database management system
Mi0034 database management system
 
Communication Online
Communication OnlineCommunication Online
Communication Online
 
3 Reasons You Should Get into Gardening
3 Reasons You Should Get into Gardening3 Reasons You Should Get into Gardening
3 Reasons You Should Get into Gardening
 

Ähnlich wie Univ 100 research presentation

Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Deb Birch
 
Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware IOSR Journals
 
Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....Research Publish Journals (Publisher)
 
X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceIJECEIAES
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksDiane M. Metcalf
 
Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Softwar...
Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Softwar...Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Softwar...
Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Softwar...lephuocthinh2
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docxdrennanmicah
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer VandalismAditya Singh
 
Analysis of field data on web security vulnerabilities
Analysis of field data on web security vulnerabilities Analysis of field data on web security vulnerabilities
Analysis of field data on web security vulnerabilities Papitha Velumani
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Satria Ady Pradana
 
Top 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdfTop 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdfDipak Tiwari
 
Fighting computer viruses
Fighting computer virusesFighting computer viruses
Fighting computer virusesNguyễn Anh
 
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...IJNSA Journal
 

Ähnlich wie Univ 100 research presentation (20)

Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
 
Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware
 
Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....
 
X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligence
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Softwar...
Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Softwar...Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Softwar...
Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Softwar...
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
 
eForensics_17_2013_KMOKER
eForensics_17_2013_KMOKEReForensics_17_2013_KMOKER
eForensics_17_2013_KMOKER
 
Analysis of field data on web security vulnerabilities
Analysis of field data on web security vulnerabilities Analysis of field data on web security vulnerabilities
Analysis of field data on web security vulnerabilities
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
Top 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdfTop 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdf
 
Fighting computer viruses
Fighting computer virusesFighting computer viruses
Fighting computer viruses
 
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
 

Kürzlich hochgeladen

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 

Kürzlich hochgeladen (20)

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 

Univ 100 research presentation

  • 1.
  • 4. Research Focus • Research in software engineering and human- computer interaction • Current focus on malicious software analysis and cyber warfare • The aforementioned topic deals with identifying and defending against malware that attacks users to compromise their information.
  • 5. Abstract Summary BlackHat hackers are the villains of computer technology. The malware that they write is very harmful to average computer users. It seeks to compromise their systems and personal information. The purpose of the research done in this project is to create an automated way for WhiteHats (the good guys) to detect and defend against malware that is derived from previous versions of harmful software by changing a very little amount of code. By successfully comparing malicious programs and finding matches, new, non-innovative variations of malware can be easily defeated. Bottom Line All of the research done by Dr. Walenstein is done with the hopes of making the experience of using a computer, and the Internet, safer.
  • 6. Exploiting Similarity Between Variants to Defeat Malware Abstract Summary BlackHat hackers are the villains of computer technology. The malware that they write is very harmful to average computer users. It seeks to compromise their systems and personal information. The purpose of the research done in this project is to create an automated way for WhiteHats (the good guys) to detect and defend against malware that is derived from previous versions of harmful software by changing a very little amount of code. By successfully comparing malicious programs and finding matches, new, non-innovative variations of malware can be easily defeated. Bottom Line All of the research done by Dr. Walenstein is done with the hopes of making the experience of using a computer, and the Internet, safer.
  • 7. Created by: Jeffery L. Jackson, Jr. October 19, 2011

Hinweis der Redaktion

  1. \n\n
  2. \n\n
  3. \n\n
  4. \n\n
  5. \n\n
  6. \n\n
  7. \n\n
  8. \n\n
  9. \n\n
  10. \n\n