Malpedia: A Collaborative Effort to Inventorize the Malware Landscape

In this paper, we introduce Malpedia, our take on a collaborative platform for the curation  of a coherent corpus of cleanly labeled, unpacked malware samples. Illustrating one of the use cases for this data set, we provide a comparative overview of structural characteristics for more than 300 families of Windows malware.


Daniel Plohmann works as a senior analyst for Fraunhofer FKIE, taking apart malware families and botnet instances. His PhD research at University of Bonn focuses on automation and improving the efficiency of reverse engineering as an instrument for in-depth analysis. As a Teaching Assistant and Thesis Advisor for computer security related topics, he gives regular presentations and workshops on malware analysis and botnet infiltration. He also loves to put his experience to good use by supporting law enforcement as a subject matter expert.

Thursday December 7th 2018
14:00-15:00
Malpedia: A Collaborative Effort to Inventorize the Malware Landscape
Daniel Plohmann; Martin Clauß; Steffen Enders; Elmar Padilla
Malpedia
presentation
Print Friendly, PDF & Email
Daniel Plohmann
Daniel Plohmann

@push_pnx

Reverse Engineering & Malware Analysis Research @Fraunhofer_FKIE. Blog: @ByteAtlas || Projects: @malpedia | #ApiScout | #IDAscope | #DGArchive |
Yaaay, second mention/use of @malpedia in one day! Daniel, who contributed/curated a big portion of the macOS malwa… https://t.co/aLtL2kVNF6 - 4 days ago
Daniel Plohmann