<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Malware</title><link>http://www.sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Malware</description><atom:link href="http://www.sei.cmu.edu/blog/feeds/tag/malware/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 19 Sep 2022 00:00:00 -0400</lastBuildDate><item><title>Using Alternate Data Streams in the Collection and Exfiltration of Data</title><link>https://www.sei.cmu.edu/blog/using-alternate-data-streams-in-the-collection-and-exfiltration-of-data/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In this blog post, we describe how attackers obscure their activity via alternate data streams (ADSs) and how to defend against malware attacks that employ ADSs.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dustin Updyke, Molly Jaconski</dc:creator><pubDate>Mon, 19 Sep 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/using-alternate-data-streams-in-the-collection-and-exfiltration-of-data/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>Malware Analysis</category><category>Malware</category></item><item><title>Vulnerabilities: Everybody’s Got One!</title><link>https://www.sei.cmu.edu/blog/vulnerabilities-everybodys-got-one/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In this post, Leigh Metcalf describes how she pulled data from the malvuln project to explore recent vulnerabilities in both malware and non-malware to study the differences.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Leigh Metcalf</dc:creator><pubDate>Wed, 16 Jun 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/vulnerabilities-everybodys-got-one/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>CERT/CC Vulnerabilities</category><category>Vulnerability Analysis</category><category>Malware Analysis</category><category>Malware</category></item><item><title>Business Email Compromise: Operation Wire Wire and New Attack Vectors</title><link>https://www.sei.cmu.edu/blog/business-email-compromise-operation-wire-wire-and-new-attack-vectors/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In June 2018, Federal authorities announced a significant coordinated effort to disrupt business email compromise (BEC) schemes that are designed to intercept and hijack wire transfers from businesses and individuals....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Anne Connell</dc:creator><pubDate>Mon, 08 Apr 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/business-email-compromise-operation-wire-wire-and-new-attack-vectors/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Malware</category><category>Cyber Missions</category><category>Best Practices in Network Security</category><category>Social Engineering</category></item><item><title>Path Finding in Malicious Binaries: First in a Series</title><link>https://www.sei.cmu.edu/blog/path-finding-in-malicious-binaries-first-in-a-series/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In a previous post, I discussed the Pharos Binary Analysis Framework and tools to support reverse engineering of binaries with a focus on malicious code analysis. Recall that Pharos is....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jeff Gennari</dc:creator><pubDate>Mon, 10 Dec 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/path-finding-in-malicious-binaries-first-in-a-series/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Reverse Engineering for Malware Analysis</category><category>Malware Analysis</category><category>Cyber Missions</category><category>Malware</category></item><item><title>Security Begins at the Home Router</title><link>https://www.sei.cmu.edu/blog/security-begins-at-the-home-router/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In recent days, the VPNFilter malware has attracted attention, much of it in the wake of a May 25 public service announcement from the FBI, as well as a number of announcements from vendors and security companies....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Vijay Sarvepalli</dc:creator><pubDate>Mon, 30 Jul 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/security-begins-at-the-home-router/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Missions</category><category>Malware</category></item><item><title>Big-Data Malware: Preparation and Messaging</title><link>https://www.sei.cmu.edu/blog/big-data-malware-preparation-and-messaging/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Part one of this series of blog posts on the collection and analysis of malware and storage of malware-related data in enterprise systems reviewed practices for collecting malware, storing it, and storing data about it....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Brent Frye</dc:creator><pubDate>Mon, 18 Jun 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/big-data-malware-preparation-and-messaging/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Missions</category><category>Malware</category><category>Data Modeling and Analytics</category></item><item><title>Big-Data Malware: Collection and Storage</title><link>https://www.sei.cmu.edu/blog/big-data-malware-collection-and-storage/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The growth of big data has affected many fields, including malware analysis. Increased computational power and storage capacities have made it possible for big-data processing systems to handle the increased volume of data being collected....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Brent Frye</dc:creator><pubDate>Mon, 04 Jun 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/big-data-malware-collection-and-storage/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Missions</category><category>Malware</category><category>Data Modeling and Analytics</category></item><item><title>Data Science, Blacklists, and Mixed-Critical Software: The Latest Research from the SEI</title><link>https://www.sei.cmu.edu/blog/data-science-blacklists-and-mixed-critical-software-the-latest-research-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Discover recently released SEI publications in early lifecycle cost estimation, host protection strategies, AADL, and more in this SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 05 Sep 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/data-science-blacklists-and-mixed-critical-software-the-latest-research-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Malware</category><category>Software Architecture</category><category>Architecture Analysis and Design Language (AADL)</category></item><item><title>Threat Analysis Mapping, Connected Vehicles, Emerging Technologies, and Cyber-Foraging: The Latest Research from the SEI</title><link>https://www.sei.cmu.edu/blog/threat-analysis-mapping-connected-vehicles-emerging-technologies-and-cyber-foraging-the-latest-research-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Recently published SEI reports highlight the latest work of SEI technologists in estimating program costs early in the development lifecycle, threat analysis mapping, risks and vulnerabilities in connected vehicles, emerging technologies, and cyber-foraging.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 02 May 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/threat-analysis-mapping-connected-vehicles-emerging-technologies-and-cyber-foraging-the-latest-research-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Malware</category></item><item><title>Static Identification of Program Behavior using Sequences of API Calls</title><link>https://www.sei.cmu.edu/blog/static-identification-of-program-behavior-using-sequences-of-api-calls/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Learn how to statically characterize program behavior using API calls and how the SEI automated this reasoning with the malware analysis tool ApiAnalyzer.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jeff Gennari</dc:creator><pubDate>Mon, 11 Apr 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/static-identification-of-program-behavior-using-sequences-of-api-calls/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Malware</category></item><item><title>The SEI Technical Strategic Plan</title><link>https://www.sei.cmu.edu/blog/the-sei-technical-strategic-plan/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post examines research undertaken by the SEI addressing key cybersecurity, software engineering, and related acquisition issues faced by DoD.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Kevin Fall</dc:creator><pubDate>Mon, 24 Aug 2015 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-sei-technical-strategic-plan/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Big Data</category><category>Malware</category></item><item><title>The Pharos Framework: Binary Static Analysis of Object Oriented Code</title><link>https://www.sei.cmu.edu/blog/the-pharos-framework-binary-static-analysis-of-object-oriented-code/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post discusses tools developed by the SEI's CERT Division to support reverse engineering and malware analysis tasks on C++ programs.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jeff Gennari</dc:creator><pubDate>Tue, 18 Aug 2015 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-pharos-framework-binary-static-analysis-of-object-oriented-code/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Malware</category></item><item><title>Testing, Agile Metrics, Fuzzy Hashing, Android, and Big Data: The SEI Blog Mid-Year Review (Top 10 Posts)</title><link>https://www.sei.cmu.edu/blog/testing-agile-metrics-fuzzy-hashing-android-and-big-data-the-sei-blog-mid-year-review-top-10-posts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>As we reach the mid-year point, this blog posting highlights our 10 most popular posts, and links to additional related resources you might find of interest</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 13 Jul 2015 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/testing-agile-metrics-fuzzy-hashing-android-and-big-data-the-sei-blog-mid-year-review-top-10-posts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>High-Performance Computing</category><category>Malware</category><category>Testing</category><category>Agile</category></item><item><title>The 2014 Year in Review: Top 10 Blog Posts</title><link>https://www.sei.cmu.edu/blog/the-2014-year-in-review-top-10-blog-posts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Discover the top 10 SEI Blog posts of 2014, and dive deeper into each area of research.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 22 Dec 2014 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/the-2014-year-in-review-top-10-blog-posts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Devops</category><category>Android</category><category>Secure Coding</category><category>Malware</category><category>Agile</category><category>Big Data</category></item><item><title>The Latest Research from the SEI - July 2014</title><link>https://www.sei.cmu.edu/blog/latest-research-sei2/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Discover the SEI's latest research on secure coding, the CERT Resilience Management Model, malicious-code reverse engineering, and incident management.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 07 Jul 2014 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/latest-research-sei2/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Malware</category><category>Resilience Management Model (RMM)</category><category>Secure Coding</category><category>Systems Engineering</category></item><item><title>A New Approach to Prioritizing Malware Analysis</title><link>https://www.sei.cmu.edu/blog/a-new-approach-to-prioritizing-malware-analysis/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog presents SEI and CMU's research demonstrating a 98% accurate approach for distinguishing between malicious and benign binary files.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">José Morales</dc:creator><pubDate>Mon, 21 Apr 2014 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/a-new-approach-to-prioritizing-malware-analysis/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Malware</category></item><item><title>Provenance Inference in Software</title><link>https://www.sei.cmu.edu/blog/provenance-inference-in-software/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Explore research on source code evolution and creation of models that recover relationships between codes when provenance is unknown in this SEI Blog.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Casey</dc:creator><pubDate>Mon, 03 Feb 2014 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/provenance-inference-in-software/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Malware</category></item><item><title>2013: The Research Year in Review</title><link>https://www.sei.cmu.edu/blog/2013-the-research-year-in-review/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Discover highlights of the SEI’s R&amp;D accomplishments in 2013.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 23 Dec 2013 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/2013-the-research-year-in-review/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Insider Threat</category><category>Malware</category><category>Agile</category><category>Software Architecture</category><category>Architecture Analysis and Design Language (AADL)</category></item><item><title>Prioritizing Malware Analysis</title><link>https://www.sei.cmu.edu/blog/prioritizing-malware-analysis/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In early 2012, a backdoor Trojan malware named Flame was discovered in the wild. When fully deployed, Flame proved very hard for malware researchers to analyze....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">José Morales</dc:creator><pubDate>Mon, 04 Nov 2013 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/prioritizing-malware-analysis/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Malware Analysis</category><category>Malware</category><category>CERT/CC</category></item><item><title>Deterrence for Malware: Towards a Deception-Free Internet</title><link>https://www.sei.cmu.edu/blog/deterrence-for-malware-towards-a-deception-free-internet/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post highlights research on identifying malicious patterns, building incentives-based measurement systems, and improving software resilience to attacks.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Casey</dc:creator><pubDate>Mon, 23 Sep 2013 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/deterrence-for-malware-towards-a-deception-free-internet/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Malware</category></item></channel></rss>