Malware Research Institute


Deploying ICS Honeypots to Deceive and Thwart Adversariesby Lukas Rist

The talk was presented on October 23, 2014 at SECURE 2014 - an IT security conference organized by NASK and...

Read More

A Threat-Based Security Monitoring Case Studyby Matthew Valites

The talk was presented on October 23, 2014 at SECURE 2014 - an IT security conference organized by NASK and...

Read More

Cuckoo Sandbox and its recent developmentsby Jurriaan Bremer

The talk was presented on October 23, 2014 at SECURE 2014 - an IT security conference organized by NASK and...

Read More

YARA: The pattern matching swiss knife for malware researchers and everyone elseby Victor Manuel Alvarez

The talk “YARA: The pattern matching swiss knife for malware researchers and everyone else” was presented on October 23, 2014...

Read More

Visual Malware Reversing: How to Stop Reading Assembly and Love the Codeby Danny Quist

Reverse engineering is a complicated process that has a lot of room for improvement. This talk will showcase some improvements...

Read More
Load More…