SECRET
  • Home
  • About
  • People
  • Awards
  • Projects
  • Partners
  • Publications
  • News
  • Contact

SECRET @ SBSEG2019 #3

Published by SECRET on 7 de September de 20197 de September de 2019

Marcus Botacin, a SECRET member, present his research about malware variants identification in practice. The research was awarded by the program committee during the event. Check all details on github.

https://github.com/marcusbotacin/Malware.Variants
Categories: Newspaperssbseg
Tags: malwarenewspaperssbseg

Recent Posts
  • Adversarial Machine Learning, Malware Detection, and the 2021’s MLSEC Competition
  • Book Review: Using Science in CyberSecurity
  • From CobaltStrike detection ideas to SECRET papers
  • Thoughts on Solarwinds’ samples
  • A Ransomware has landed! @Embraer
Archives
  • September 2021
  • July 2021
  • December 2020
  • November 2020
  • September 2020
  • June 2020
  • May 2020
  • April 2020
  • February 2020
  • November 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
Categories
  • banking
  • competition
  • machine learning
  • malware
  • News
  • papers
  • ransomware
  • sbseg

Related Posts

malware

Book Review: Using Science in CyberSecurity

In this post, I present my impressions of this book I recently read. Why Am I Reading It? To start, I think it’s important to give some context, as things cannot be interpreted absolutely. In Read more…

machine learning

And the Competition Winner is… Everyone!

Last year we were breaking machine learning models for malware detection. We were able to bypass all the models of the competition, finishing in the second position — unfortunately, it was not enough to win Read more…

machine learning

Sharing Machine Learning Secrets

We are happy to share with you our newest machine learning secret! Scikit-multiflow 0.5 is now available, including our open-source contribution: delayed labels evaluation for supervised learning. We expect that the community makes great use Read more…

Informatics Department (DInf) - UFPR
© 2023 SECRET - SECurity & Reverse Engineering Team laboratory