Univ 100 research presentation

190 views
165 views

Published on

Published in: Technology, Health & Medicine
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
190
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • \n\n
  • \n\n
  • \n\n
  • \n\n
  • \n\n
  • \n\n
  • \n\n
  • \n\n
  • \n\n
  • \n\n
  • Univ 100 research presentation

    1. 1. Dr. Andrew Walensteinaxw8185@louisiana.ed Computer Science
    2. 2. Research Focus
    3. 3. Research Focus• Research in software engineering and human- computer interaction• Current focus on malicious software analysis and cyber warfare• The aforementioned topic deals with identifying and defending against malware that attacks users to compromise their information.
    4. 4. Abstract SummaryBlackHat hackers are the villains of computer technology. The malware that theywrite is very harmful to average computer users. It seeks to compromise theirsystems and personal information. The purpose of the research done in thisproject is to create an automated way for WhiteHats (the good guys) to detectand defend against malware that is derived from previous versions of harmfulsoftware by changing a very little amount of code. By successfully comparingmalicious programs and finding matches, new, non-innovative variations ofmalware can be easily defeated. Bottom Line All of the research done by Dr. Walenstein is done with the hopes of making the experience of using a computer, and the Internet, safer.
    5. 5. Exploiting Similarity Between Variants to Defeat Malware Abstract SummaryBlackHat hackers are the villains of computer technology. The malware that theywrite is very harmful to average computer users. It seeks to compromise theirsystems and personal information. The purpose of the research done in thisproject is to create an automated way for WhiteHats (the good guys) to detectand defend against malware that is derived from previous versions of harmfulsoftware by changing a very little amount of code. By successfully comparingmalicious programs and finding matches, new, non-innovative variations ofmalware can be easily defeated. Bottom Line All of the research done by Dr. Walenstein is done with the hopes of making the experience of using a computer, and the Internet, safer.
    6. 6. Created by:Jeffery L. Jackson, Jr. October 19, 2011

    ×