Automated Reverse Engineering of Malware to Develop Network Signatures to Match with Known Network Signatures

Illicit software that seeks to steal user information, deny service, or cause general mayhem on computer networks is often discovered after the damage has been done. The ability to discover network behavior of software before a computer network is utilized would allow administrators to protect and p...

Full description

Bibliographic Details
Main Author: Sinema, Dan
Format: Others
Published: DigitalCommons@USU 2014
Subjects:
Online Access:https://digitalcommons.usu.edu/etd/3315
https://digitalcommons.usu.edu/cgi/viewcontent.cgi?article=4306&context=etd