Case Study

Accelerating Cyber Vulnerability Analysis with Binary Files Rendered as Images

Accelerating Cyber Vulnerability Analysis with Binary Files Rendered as Images

Pages 2 Pages

Accelerating Cyber Vulnerability Analysis with Binary Files Rendered as Images Challenge The keystone of cyber vulnerability analysis involves accurate scrutiny of binary data consisting of ones and zeros. A typical suspect data stream may contain billions of ones and zeros complicating the analysis process. Traditional analytic tools rely on binary files being organized in a standard structure with header and signature. Unfortunately, malware often modifies established structure in order to hide malicious code. A modified structure breaks traditional tools, which forces analysts to manually examine mountains of raw data with a hex editor. Manual analysis of a data stream requires skilled experts doing tedious work that can take weeks or months. Even then, discovery of the vulnerability mi

Join for free to read