|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
University of Cambridge > Talks.cam > Computer Laboratory Wednesday Seminars > Structural executable comparison, malware classification, and collaborative binary analysis - the formerly-zynamics tools at Google
Structural executable comparison, malware classification, and collaborative binary analysis - the formerly-zynamics tools at Google
If you have a question about this talk, please contact Stephen Clark.
Recent years have seen an explosion in the industry adoption of reverse engineering for security purposes. Between the late 90’s and today, a niche endeavor turned into industry practice – both for the analysis of malicious software and for the security review of closed-source software components. In 2011, Google acquired zynamics GmbH, a small company focused on developing software for (security-minded) reverse engineers. This talk will give an overview of the different areas in which zynamics worked prior to joining Google, and some of the directions in which we’re moving now.
On the technical level, the talk will give an overview over our structural / graph-centric algorithms for executable comparison, how we used these algorithms for malware classification and byte-signature generation, and over our reverse-engineering IDE which permits fully collaborative disassembly analysis for teams of reverse engineers.
This talk is part of the Computer Laboratory Wednesday Seminars series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsDAMTP info aggregator Behavioural and Clincial Neuroscience Seminars Special Lecture
Other talksGlobal Burden of Disease: from Global to Local Evilicious: Why we evolved a taste for being bad Iodine status in the UK and implications for fetal brain development Parasitic nematode microRNAs- finding a function Captured Thoughts: The Collaborations of an Artist and a Scientist Sailing to the Sinophone World