{"id":8415,"date":"2023-06-29T17:31:01","date_gmt":"2023-06-29T15:31:01","guid":{"rendered":"https:\/\/sites.unica.it\/pralab\/?page_id=8415"},"modified":"2023-06-29T17:31:02","modified_gmt":"2023-06-29T15:31:02","slug":"malware-detection-analysis-and-classification","status":"publish","type":"page","link":"https:\/\/sites.unica.it\/pralab\/malware-detection-analysis-and-classification\/","title":{"rendered":"Malware detection, analysis and classification"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Malware detection, analysis and classification<\/h2>\n\n\n\n<p>This research topic studies malicious software to determine a given sample&#8217;s functionalities, origin and potential impact. The objective is to design automated solutions that may simplify human analysts&#8217; work in detecting malware among legitimate software and recognizing the sample&#8217;s families that can be distinguished. Attack vector and functionality are the most characterizing features between malware types. Examples are&nbsp;<strong>worms<\/strong>,&nbsp;<strong>trojan horses<\/strong>,&nbsp;<strong>backdoors<\/strong>, and&nbsp;<strong>ransomware<\/strong> which is one the current most impactful threats.<\/p>\n\n\n\n<p>Pra Lab Cybersecurity is currently working on<strong>\u00a0Living-off-the-land<\/strong>\u00a0<strong>LotL<\/strong>(i.e. malware that exploits legitimate software functionalities, like Adobe PDF and Office doc, to execute dangerous activities),\u00a0<strong>x86<\/strong>, and\u00a0<strong>Android malware<\/strong>. <\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malware detection, analysis and classification This research topic studies malicious software to determine a given sample&#8217;s functionalities, origin and potential impact. The objective is to design automated solutions that may simplify human analysts&#8217; work in detecting malware among legitimate software and recognizing the sample&#8217;s families that can be distinguished. Attack vector and functionality are the&hellip;&nbsp;<a href=\"https:\/\/sites.unica.it\/pralab\/malware-detection-analysis-and-classification\/\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Malware detection, analysis and classification<\/span><\/a><\/p>\n","protected":false},"author":9686,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"class_list":["post-8415","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/sites.unica.it\/pralab\/wp-json\/wp\/v2\/pages\/8415","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.unica.it\/pralab\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.unica.it\/pralab\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.unica.it\/pralab\/wp-json\/wp\/v2\/users\/9686"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.unica.it\/pralab\/wp-json\/wp\/v2\/comments?post=8415"}],"version-history":[{"count":10,"href":"https:\/\/sites.unica.it\/pralab\/wp-json\/wp\/v2\/pages\/8415\/revisions"}],"predecessor-version":[{"id":8444,"href":"https:\/\/sites.unica.it\/pralab\/wp-json\/wp\/v2\/pages\/8415\/revisions\/8444"}],"wp:attachment":[{"href":"https:\/\/sites.unica.it\/pralab\/wp-json\/wp\/v2\/media?parent=8415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}