|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
University of Cambridge > Talks.cam > Computer Laboratory Wednesday Seminars > Structural executable comparison, malware classification, and collaborative binary analysis - the formerly-zynamics tools at Google
Structural executable comparison, malware classification, and collaborative binary analysis - the formerly-zynamics tools at Google
If you have a question about this talk, please contact Stephen Clark.
Recent years have seen an explosion in the industry adoption of reverse engineering for security purposes. Between the late 90’s and today, a niche endeavor turned into industry practice – both for the analysis of malicious software and for the security review of closed-source software components. In 2011, Google acquired zynamics GmbH, a small company focused on developing software for (security-minded) reverse engineers. This talk will give an overview of the different areas in which zynamics worked prior to joining Google, and some of the directions in which we’re moving now.
On the technical level, the talk will give an overview over our structural / graph-centric algorithms for executable comparison, how we used these algorithms for malware classification and byte-signature generation, and over our reverse-engineering IDE which permits fully collaborative disassembly analysis for teams of reverse engineers.
This talk is part of the Computer Laboratory Wednesday Seminars series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsEMBL-EBI Science and Society Programme CU Pakistan Society Soc Doc Soc
Other talksTBC (hypoxia signalling) Lunchtime talks TBC - from Bench to Books: writing science books for children Christina Koning, novelist Human-like singing and talking machines: flexible speech synthesis in karaoke, anime, smart phones, video games, digital signage, TV and radio programs, etc. Inferno XXI, Purgatorio XXI, Paradiso XXI