Skip to main content

Mr Paul Black

Post-Doctoral Fellow, Cybersecurity

Information Technology

Section/Portfolio:

Information Technology

Location:

Mt Helen Campus, Online

Cross-compiler bipartite vulnerability search

Open-source libraries are widely used in software development, and the functions from these...

Reanimating Historic Malware Samples

  • Book Chapters

API Based Discrimination of Ransomware and Benign Cryptographic Programs

Ransomware is a widespread class of malware that encrypts files in a victim’s computer and...

Foundations of the DEFT Project: tertiary educators Developing Expertise Fostering Thinking

We describe the rationale, creation, and activity of a long-term co-constructed voluntary...

Function Similarity Using Family Context

Finding changed and similar functions between a pair of binaries is an important problem in...

Identifying cross-version function similarity using contextual features

The identification of similar functions in malware assists analysis by supporting the exclusion...

Evolved similarity techniques in Malware Analysis

Malware authors are known to reuse existing code, this development process results in software...

A survey of similarities in banking malware behaviours

Banking malware are a class of information stealing malicious software that target the financial...

Mining malware secrets

Malware analysts, besides being tasked to create signatures, are also called upon to generate...

Be careful who you trust: Issues with the public key infrastructure