icon-carat-right menu search cmu-wordmark

Malware Analysis

Video
By
Malware analysis requires specialized skills, and when confronted with novel malware binaries, malware analysts can spend days (or even weeks) reverse-engineering a single sample.
Publisher

Software Engineering Institute

Watch

Abstract

Automation of static analysis of malicious binaries amplifies the effort of a limited pool of malware analysts and accelerates insight generation captured by higher-level abstractions accessible to more network defenders within the U.S. Department of Defense (DoD). Analyzing large numbers of malware attacking the DoD worldwide infrastructure is a time-consuming process. Malware analysis requires specialized skills, and when confronted with novel malware binaries, malware analysts can spend days (or even weeks) reverse-engineering a single sample.

This bottleneck in the process of deriving actionable insights by understanding the threat presented by malware can be mitigated by both automating repetitive tasks and providing more semantically rich abstractions used by a malware analyst and others who use his or her results.