|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
University of Cambridge > Talks.cam > Computer Laboratory Wednesday Seminars > Structural executable comparison, malware classification, and collaborative binary analysis - the formerly-zynamics tools at Google
Structural executable comparison, malware classification, and collaborative binary analysis - the formerly-zynamics tools at Google
If you have a question about this talk, please contact Stephen Clark.
Recent years have seen an explosion in the industry adoption of reverse engineering for security purposes. Between the late 90’s and today, a niche endeavor turned into industry practice – both for the analysis of malicious software and for the security review of closed-source software components. In 2011, Google acquired zynamics GmbH, a small company focused on developing software for (security-minded) reverse engineers. This talk will give an overview of the different areas in which zynamics worked prior to joining Google, and some of the directions in which we’re moving now.
On the technical level, the talk will give an overview over our structural / graph-centric algorithms for executable comparison, how we used these algorithms for malware classification and byte-signature generation, and over our reverse-engineering IDE which permits fully collaborative disassembly analysis for teams of reverse engineers.
This talk is part of the Computer Laboratory Wednesday Seminars series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsPublic Health talks Genetics Postdoc Seminar Graduate Seminars
Other talksCost constrained optimal designs for regression models with random parameters Completing the Cent Cols Challenge (for the third time) HIFs, mitochondria and cardioprotection Rail Exclusive - DfT TBC (SP Workshop) From disease ecology to disease control: is elimination of rabies possible