Tag: reverse-engineering

  • VB2018 preview: Workshops

    The Virus Bulletin Conference is first and foremost a place to learn: about new threats, about the tools used to detect and fight them, and to learn about (and get to know) the people that matter in the fast-changing world of threat intelligence and research. This year, you can also learn about some essential techniques…

  • VB2018 preview: Workshops

    The Virus Bulletin Conference is first and foremost a place to learn: about new threats, about the tools used to detect and fight them, and to learn about (and get to know) the people that matter in the fast-changing world of threat intelligence and research. This year, you can also learn about some essential techniques…

  • VB2017 paper: Android reverse engineering tools: not the usual suspects

    Within a few years, Android malware has grown from a relatively small threat – the first VB conference talk on Android , in 2011, mentioned fewer than 100 malware families – to a huge problem involving more than three million new malware samples a year. The subject has been a regular one on the VB conference programme,…

  • VB2017 paper: Android reverse engineering tools: not the usual suspects

    Within a few years, Android malware has grown from a relatively small threat – the first VB conference talk on Android , in 2011, mentioned fewer than 100 malware families – to a huge problem involving more than three million new malware samples a year. The subject has been a regular one on the VB conference programme,…

  • VB2017 paper: Crypton – exposing malware’s deepest secrets

    Computer scientists are notorious for a specific kind of laziness: the kind of laziness that makes them work really hard in order to avoid some other, often more boring, hard work. Crypton , a tool developed by F5 Networks researchers Julia Karpin and Anna Dorfman, is a great example of that: it aims to speed…

  • VB2017 paper: Crypton – exposing malware’s deepest secrets

    Computer scientists are notorious for a specific kind of laziness: the kind of laziness that makes them work really hard in order to avoid some other, often more boring, hard work. Crypton , a tool developed by F5 Networks researchers Julia Karpin and Anna Dorfman, is a great example of that: it aims to speed…

  • VB2017 preview: Android reverse engineering tools: not the usual suspects

    Six years ago (coincidentally the last time the VB conference was held in Spain) saw the first VB conference paper presented on Android malware, which at that time was still an esoteric and mostly theoretical threat. Things have changed a lot in the last six years – something that is perhaps best illustrated by Google ‘s…

  • VB2017 preview: Android reverse engineering tools: not the usual suspects

    Six years ago (coincidentally the last time the VB conference was held in Spain) saw the first VB conference paper presented on Android malware, which at that time was still an esoteric and mostly theoretical threat. Things have changed a lot in the last six years – something that is perhaps best illustrated by Google ‘s…

  • VB2017 preview: Crypton – exposing malware’s deepest secrets

    Ask a programmer to perform the same task twice and they will write a tool that automates it. Malware analysts are no different, and the Virus Bulletin Conference has a long history of including papers on tools and tricks that make the task of analysing malware a lot easier. ‘Crypton’ is such a tool. It…

  • VB2017 preview: Crypton – exposing malware’s deepest secrets

    Ask a programmer to perform the same task twice and they will write a tool that automates it. Malware analysts are no different, and the Virus Bulletin Conference has a long history of including papers on tools and tricks that make the task of analysing malware a lot easier. ‘Crypton’ is such a tool. It…