SlideShare a Scribd company logo
1 of 7
Dr. Andrew Walenstein
axw8185@louisiana.ed




 Computer Science
Research Focus
Research Focus
• Research in software
  engineering and human-
  computer interaction

• Current focus on malicious
  software analysis and cyber
  warfare

• The aforementioned topic
  deals with identifying and
  defending against malware
  that attacks users to
  compromise their
  information.
Abstract Summary

BlackHat hackers are the villains of computer technology. The malware that they
write is very harmful to average computer users. It seeks to compromise their
systems and personal information. The purpose of the research done in this
project is to create an automated way for WhiteHats (the good guys) to detect
and defend against malware that is derived from previous versions of harmful
software by changing a very little amount of code. By successfully comparing
malicious programs and finding matches, new, non-innovative variations of
malware can be easily defeated.


                                Bottom Line

 All of the research done by Dr. Walenstein is done with the hopes of making
 the experience of using a computer, and the Internet, safer.
Exploiting Similarity Between
            Variants to Defeat Malware

                           Abstract Summary

BlackHat hackers are the villains of computer technology. The malware that they
write is very harmful to average computer users. It seeks to compromise their
systems and personal information. The purpose of the research done in this
project is to create an automated way for WhiteHats (the good guys) to detect
and defend against malware that is derived from previous versions of harmful
software by changing a very little amount of code. By successfully comparing
malicious programs and finding matches, new, non-innovative variations of
malware can be easily defeated.


                                Bottom Line

 All of the research done by Dr. Walenstein is done with the hopes of making
 the experience of using a computer, and the Internet, safer.
Created by:


Jeffery L. Jackson, Jr.
       October 19, 2011

More Related Content

Viewers also liked

Civil & Construction Eng. Curtin University Certificate
Civil & Construction Eng. Curtin University CertificateCivil & Construction Eng. Curtin University Certificate
Civil & Construction Eng. Curtin University Certificate
Kundai Dennis Musuka
 
6ª Manoca do Canto Gaúcho Fase Local
6ª Manoca do Canto Gaúcho Fase Local6ª Manoca do Canto Gaúcho Fase Local
6ª Manoca do Canto Gaúcho Fase Local
manocadocantogaucho
 
KFIE Innovator Bios
KFIE Innovator BiosKFIE Innovator Bios
KFIE Innovator Bios
Giselle Aris
 
Resume of Josh Cannon
Resume of Josh CannonResume of Josh Cannon
Resume of Josh Cannon
Josh Cannon
 
Communication Online
Communication OnlineCommunication Online
Communication Online
kraemera
 

Viewers also liked (20)

Trust and Influence in the Complex Network of Social Media
Trust and Influence in the Complex Network of Social MediaTrust and Influence in the Complex Network of Social Media
Trust and Influence in the Complex Network of Social Media
 
Você é carente de quê?
Você é carente de quê?Você é carente de quê?
Você é carente de quê?
 
Cultura de Métricas para SEO (UaiSEO)
Cultura de Métricas para SEO (UaiSEO)Cultura de Métricas para SEO (UaiSEO)
Cultura de Métricas para SEO (UaiSEO)
 
Customer or Product? ownership and control of personal data
Customer or Product? ownership and control of personal dataCustomer or Product? ownership and control of personal data
Customer or Product? ownership and control of personal data
 
Web Analytics no TcheSEO 2011
Web Analytics no TcheSEO 2011Web Analytics no TcheSEO 2011
Web Analytics no TcheSEO 2011
 
desfile01
desfile01desfile01
desfile01
 
Social Media Metrics Definitions
Social Media Metrics DefinitionsSocial Media Metrics Definitions
Social Media Metrics Definitions
 
Marival Vacation Club
Marival Vacation ClubMarival Vacation Club
Marival Vacation Club
 
A Vendinha Da Esquina
A Vendinha Da EsquinaA Vendinha Da Esquina
A Vendinha Da Esquina
 
Search Intelligence - Social Media e Search Marketing - Proxxima 2011
Search Intelligence - Social Media e Search Marketing - Proxxima 2011Search Intelligence - Social Media e Search Marketing - Proxxima 2011
Search Intelligence - Social Media e Search Marketing - Proxxima 2011
 
Civil & Construction Eng. Curtin University Certificate
Civil & Construction Eng. Curtin University CertificateCivil & Construction Eng. Curtin University Certificate
Civil & Construction Eng. Curtin University Certificate
 
Gost r standards 2324
Gost r standards 2324Gost r standards 2324
Gost r standards 2324
 
6ª Manoca do Canto Gaúcho Fase Local
6ª Manoca do Canto Gaúcho Fase Local6ª Manoca do Canto Gaúcho Fase Local
6ª Manoca do Canto Gaúcho Fase Local
 
past simple
past simplepast simple
past simple
 
Brightside App...every-click
Brightside App...every-clickBrightside App...every-click
Brightside App...every-click
 
KFIE Innovator Bios
KFIE Innovator BiosKFIE Innovator Bios
KFIE Innovator Bios
 
Resume of Josh Cannon
Resume of Josh CannonResume of Josh Cannon
Resume of Josh Cannon
 
Mi0034 database management system
Mi0034   database management systemMi0034   database management system
Mi0034 database management system
 
Communication Online
Communication OnlineCommunication Online
Communication Online
 
3 Reasons You Should Get into Gardening
3 Reasons You Should Get into Gardening3 Reasons You Should Get into Gardening
3 Reasons You Should Get into Gardening
 

Similar to Univ 100 research presentation

Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
Deb Birch
 
Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....
Research Publish Journals (Publisher)
 
X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligence
IJECEIAES
 
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
drennanmicah
 

Similar to Univ 100 research presentation (20)

Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
 
Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware
 
Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....
 
X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligence
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Softwar...
Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Softwar...Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Softwar...
Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Softwar...
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
 
eForensics_17_2013_KMOKER
eForensics_17_2013_KMOKEReForensics_17_2013_KMOKER
eForensics_17_2013_KMOKER
 
Analysis of field data on web security vulnerabilities
Analysis of field data on web security vulnerabilities Analysis of field data on web security vulnerabilities
Analysis of field data on web security vulnerabilities
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
Top 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdfTop 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdf
 
Fighting computer viruses
Fighting computer virusesFighting computer viruses
Fighting computer viruses
 
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Univ 100 research presentation

  • 1.
  • 4. Research Focus • Research in software engineering and human- computer interaction • Current focus on malicious software analysis and cyber warfare • The aforementioned topic deals with identifying and defending against malware that attacks users to compromise their information.
  • 5. Abstract Summary BlackHat hackers are the villains of computer technology. The malware that they write is very harmful to average computer users. It seeks to compromise their systems and personal information. The purpose of the research done in this project is to create an automated way for WhiteHats (the good guys) to detect and defend against malware that is derived from previous versions of harmful software by changing a very little amount of code. By successfully comparing malicious programs and finding matches, new, non-innovative variations of malware can be easily defeated. Bottom Line All of the research done by Dr. Walenstein is done with the hopes of making the experience of using a computer, and the Internet, safer.
  • 6. Exploiting Similarity Between Variants to Defeat Malware Abstract Summary BlackHat hackers are the villains of computer technology. The malware that they write is very harmful to average computer users. It seeks to compromise their systems and personal information. The purpose of the research done in this project is to create an automated way for WhiteHats (the good guys) to detect and defend against malware that is derived from previous versions of harmful software by changing a very little amount of code. By successfully comparing malicious programs and finding matches, new, non-innovative variations of malware can be easily defeated. Bottom Line All of the research done by Dr. Walenstein is done with the hopes of making the experience of using a computer, and the Internet, safer.
  • 7. Created by: Jeffery L. Jackson, Jr. October 19, 2011

Editor's Notes

  1. \n\n
  2. \n\n
  3. \n\n
  4. \n\n
  5. \n\n
  6. \n\n
  7. \n\n
  8. \n\n
  9. \n\n
  10. \n\n