Malware in Mobile Platform from Panoramic Industrial View

Abstact: Malware has developed and broke through the traditional single concept of program code. It has penetrated into the whole system of society, politics, economy and life. It is impossible to resist malware effectively only relying on anti-virus vendors. The battle against malware requ……

Continue Reading

The Evolution Theory of Malware and Our Thought

  Abstact: The status of malware, similar to that of the living creatures, is the result of the comprehensive elimination and selection. Actually, it is the same with all the software programs. Fundamentally speaking, the theory of evolution is a science on life-death and evolution. Bot……

Continue Reading

Development, Confusion and Exploration of Honeypot Technology

Abstact: A honeypot is a security resource that can be scanned, attacked and compromised. This presentation systematically summarized the development and status quo of Honeypots, as well the technical challenges researchers face. In the final part, the writer explores the Honeypots’ potentia……

Continue Reading

Data Storage and Security Strategies of Network Identity

Abstact: This presentation focuses on data storage and security strategies in terms of network identity security. In the beginning, some background about the topic is introduced. Then, the writer summarizes the methods used in cipher text attacks and the current solutions. In the final,……

Continue Reading

Security Challenges of Antivirus Engines, Products and Systems

Abstact: This presentation explores the challenges anti-virus engines, products and systems face. In many cases, the security products are no longer the credible dams when facing with the surging malware waves; they become the trembling islands that are vulnerable sometimes. Time Top……

Continue Reading

Virus Detection System

Abstact: Network virus monitoring has been explored academically and productively. It has now expanded into a new technology with its own direction. The path of virus defense leads us to the world of freedom. This presentation summarizes the virus trends in 2004, introduced the qualities of ……

Continue Reading

PE Trojan Detection Based on the Assessment of Static File Features

Abstact: Traditional signature detection technology builds a complete sample database and extracts malware signatures. Static assessment uses an intelligent algorithm to analyze and study known samples, extract signatures and assess unknown samples. This presentation explores related issues ……

Continue Reading

Embeddable Antivirus Engine with High Granularity

Abstact: In this presentation, the writer summarizes the challenges faced by AV principles, introduces the high granularity processing and embeddable AV engine. In the final, the writer makes a conclusion that AV principles are not invariable. Instead, they are evolving dynamic principles. T……

Continue Reading

Virus Detection Based on the Packet Flow

Abstact: Developers hope to extend the anti-virus capabilities of firewalls, IDS and GAP products. Though they can be combined with the file-level detection of traditional antivirus vendors, there are still some problems. This presentation attempts to explore the integration point of network……

Continue Reading