We Increase sensitization and awareness around malicious Code
Cyberattacks are
henceforth a geostrategic arm for a growing number of nations, States and
government agencies. Thus, beyond sophisticated and targeted attacks from organized
hackers, malicious Code invades progressively
our digital lives.
Therefore Connectikpeople.co has captured for you two important documents susceptible
to help when it comes to Characterizing and Prioritizing Malicious Code, (PDF) and Behavioraland Structural Properties of Malicious Code.(PDF)
Julia Allen, principal researcher at CERT working on operational resilience,
and Jose Morales, senior member of the technical staff at CERT, working in
malicious software research with the Forensics, Operations, and Investigations
group, focus on Characterizing and Prioritizing Malicious Code.
At Secure Systems Lab Technical University Vienna, they introduce
techniques to characterize behavioral and structural properties of binary code.
Connectikpeople.co can note these techniques can be used to generate more
abstract, semantically-rich descriptions of malware, and to characterize
classes of malicious code instead of specific instances.