malware
An Obfuscation Tour
Obfuscation is often used by malware samples to hide their SECRETs, but we know how to uncover them. Want to know as well? Check our guide here.
Obfuscation is often used by malware samples to hide their SECRETs, but we know how to uncover them. Want to know as well? Check our guide here.
The world is lockedown, but SECRET’s finding keep being unlocked. This time we uncovered a wave of ransomware threats. Check it out here.
Last month SECRET started a collaboration with researchers from the University of Waikato, located in Hamilton, New Zealand. The University of Waikato is famous for developing open-source machine learning frameworks, such as Weka, MOA, and scikit-multiflow. The main objective of Read more…
Here we are again! This time our principal investigator, Andre Grégio, attended the ENIGMA 2020 conference, which took place at San Francisco, CA, USA. This was our second time at the conference, last year two of our PhD students were Read more…
Applying machine learning techniques to cyber security has become popular nowadays. The majority of existing work aim to produce results that achieve accuracy, f1 score and precision rates close to 100%, without taking into account problems such as adversarial samples. Read more…
Marcus’ RevEngE against malware! This week SECRET arrived in Vienna to participate of the Reversing and Offensive-oriented Trends Symposium 2019 (ROOTS). Marcus discussed challenges and pitfalls of decompiling malicious samples and presented RevEnge, the Reverse Engineering Engine. RevEngE is a Read more…
Brazil hosted the 4th BRICS Young Scientist Forum, which main themes were cybersecurity and bioeconomy and took place in Rio de Janeiro from November 6th to November 8th, 2019. André Grégio attended the event and was able to share our Read more…
Tamy Beppler, a SECRET researcher, has been presenting her research in the 2019 Information Security Conference. Tamy investigated the use of file textutres for malware families’ classification. Interested in taking a look on her results? Check this link.
An Internet company has been promoting a competition that challenges researchers to bypass machine learning models for malware detection. SECRET has been participating this challenge and our members (Fabrício Ceschin and Marcus Botacin) were able to bypass all models! Want Read more…
Another SECRET course! Marcus Botacin presented how to reverse engineer Linux ELF binaries at SBSEG 2019. Check course materials on the github.