|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
University of Cambridge > Talks.cam > Computer Laboratory Wednesday Seminars > Structural executable comparison, malware classification, and collaborative binary analysis - the formerly-zynamics tools at Google
Structural executable comparison, malware classification, and collaborative binary analysis - the formerly-zynamics tools at Google
If you have a question about this talk, please contact Stephen Clark.
Recent years have seen an explosion in the industry adoption of reverse engineering for security purposes. Between the late 90’s and today, a niche endeavor turned into industry practice – both for the analysis of malicious software and for the security review of closed-source software components. In 2011, Google acquired zynamics GmbH, a small company focused on developing software for (security-minded) reverse engineers. This talk will give an overview of the different areas in which zynamics worked prior to joining Google, and some of the directions in which we’re moving now.
On the technical level, the talk will give an overview over our structural / graph-centric algorithms for executable comparison, how we used these algorithms for malware classification and byte-signature generation, and over our reverse-engineering IDE which permits fully collaborative disassembly analysis for teams of reverse engineers.
This talk is part of the Computer Laboratory Wednesday Seminars series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsDarwin Society Cambridge University International Development (CUID) The Eddington Lectures
Other talksTHE DRILLERS DON’T LIKE GETTING WET or WHY THE LAUNDRY ROOM KEEPS GETTING FLOODED : Water up to surprisingly high levels around the legs of large floating oil rigs Cultured Birds? Social networks, personality and social learning in parids. The ice-covered ocean: too big a challenge for climate models? Controller Design of a Grid-tie Inverter to Enhance Fault-Ride-Through Capability tba Inferno XVIII, Purgatorio XVIII, Paradiso XVIII