Malware Analysis
• Video
Publisher
Software Engineering Institute
Watch
Abstract
Automation of static analysis of malicious binaries amplifies the effort of a limited pool of malware analysts and accelerates insight generation captured by higher-level abstractions accessible to more network defenders within the U.S. Department of Defense (DoD). Analyzing large numbers of malware attacking the DoD worldwide infrastructure is a time-consuming process. Malware analysis requires specialized skills, and when confronted with novel malware binaries, malware analysts can spend days (or even weeks) reverse-engineering a single sample.
This bottleneck in the process of deriving actionable insights by understanding the threat presented by malware can be mitigated by both automating repetitive tasks and providing more semantically rich abstractions used by a malware analyst and others who use his or her results.