If someone is interested in infosec and starts reversing/analysing, they will stumble over problems and questions, e.g., missing tools, missing info ... This is what they should use for their thesis. If you dictate a topic, it won't be their heart's interest.
-
-
-
I would ask them: When you analysed/reversed samples, what was the most exciting thing? What the most difficult thing you solved that you are proud of? Is there anything that could have helped you to achieve that easier?
- Još 2 druga odgovora
Novi razgovor -
-
-
I’d be interested to see some analysis of Microsoft’s recent implementation of DTrace’s utility as an aid to RE/Exploit dev research compared to traditional Windows tooling.https://docs.microsoft.com/en-us/windows-hardware/drivers/devtest/dtrace …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
I believe
@H0l3Bl4ck did his Masters thesis based on malware analysis. -
A small part of my Master was to do a Reversing of a keylogger. There is a static and a dynamic part.
- Još 2 druga odgovora
Novi razgovor -
-
-
AFAIK noone ever build Seawave (a concept worm on layer 2 CAM, STP, OSPF, ARP and LLDP) from PhD thesis 2012 al-Salloum "Topology-Aware Vulnerability Mitigation Worms" https://www.ma.rhul.ac.uk/static/techrep/2012/MA-2012-03.pdf … This updatedhttps://twitter.com/daniel_bilar/status/616617430387937280 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
Have a look at malware similarity measurement research. Graph similarity (and scalable too), API similarity etc. tons of research on which to build came out of Cyber Genome.
-
Build a malware clustering engine, a timeline builder or a phylogeny tree. All sorts of fun stuff you can do. Then rig it up to a honeypot to classify your samples and flag on novel families that appear.
Kraj razgovora
Novi razgovor -
-
-
automatic Semantic tagging. E.g. apply semantic names to functions in IDA "SemTagCryptographicRoutine", "SemTagEnumerateFiles". A BA could try to locate typical routines in ransomware. An ambitious MA could look into NLP techniques.
-
We should chat about this sometime ;-) I've been working with
@m_r_tz recently in this area. I bet you'd have some valuable insight. To thesis writers: feel free to reach out and we can collaborate :-) - Još 2 druga odgovora
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.