Symbolic execution for rapid threat analysis
Symbolic Execution for Rapid Threat Analysis
Iqbal Gondal, Peter Vamplew, Rosemary Torney
Contact person and email address:
Iqbal Gondal, Iqbal.firstname.lastname@example.org, Director ICSL
A brief description of the project:
Malware attacks are occurring with high frequency and severity to the infrastructure of vital industries: banks, telecommunications, utilities, transport networks, Governments etc. To prolong the attack campaigns, malware changes their behaviours polymorphically and metamorphically. Further new variants of the malware are released over short period of time, which gives a very short window of time to the malware reverse engineering teams to analyse their static and dynamic behaviours. This project will investigate the use of symbolic execution in determining the level of threat posed by the malware and its variants.