We Increase sensitization and awareness around malicious Code



Cyberattacks are henceforth a geostrategic arm for a growing number of nations, States and government agencies. Thus, beyond sophisticated and targeted attacks from organized hackers, malicious Code invades progressively our digital lives.

Therefore Connectikpeople.co has captured for you two important documents susceptible to help when it comes to Characterizing and Prioritizing Malicious Code, (PDF) and Behavioraland Structural Properties of Malicious Code.(PDF)

Julia Allen, principal researcher at CERT working on operational resilience, and Jose Morales, senior member of the technical staff at CERT, working in malicious software research with the Forensics, Operations, and Investigations group, focus on Characterizing and Prioritizing Malicious Code.

At Secure Systems Lab Technical University Vienna, they introduce techniques to characterize behavioral and structural properties of binary code

Connectikpeople.co can note these techniques can be used to generate more abstract, semantically-rich descriptions of malware, and to characterize classes of malicious code instead of specific instances.

Popular Posts