|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
University of Cambridge > Talks.cam > Computer Laboratory Wednesday Seminars > Structural executable comparison, malware classification, and collaborative binary analysis - the formerly-zynamics tools at Google
Structural executable comparison, malware classification, and collaborative binary analysis - the formerly-zynamics tools at Google
If you have a question about this talk, please contact Stephen Clark.
Recent years have seen an explosion in the industry adoption of reverse engineering for security purposes. Between the late 90’s and today, a niche endeavor turned into industry practice – both for the analysis of malicious software and for the security review of closed-source software components. In 2011, Google acquired zynamics GmbH, a small company focused on developing software for (security-minded) reverse engineers. This talk will give an overview of the different areas in which zynamics worked prior to joining Google, and some of the directions in which we’re moving now.
On the technical level, the talk will give an overview over our structural / graph-centric algorithms for executable comparison, how we used these algorithms for malware classification and byte-signature generation, and over our reverse-engineering IDE which permits fully collaborative disassembly analysis for teams of reverse engineers.
This talk is part of the Computer Laboratory Wednesday Seminars series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsC.U. Cryptographic Currency Society American History Seminars Current Issues in Assessment
Other talksThe 2016 Sleep Summit Eleventh William Pitt Seminar: A Higher Purpose: the role of universities in C21st Britain tbc Multiresolution network models Wake effects in the ocean - from dolphins to CTDs via western boundary currents Helium ion sources