2019年9月20日 星期五

TrendLabs: Malware Classification with ‘Graph Hash,’ Applied to the Orca Cyberespionage Campaign


Figure 1. An example of a call graph plotted via Interactive Disassembler Pro (IDA Pro)
REF: https://blog.trendmicro.com/trendlabs-security-intelligence/malware-classification-with-graph-hash-applied-to-the-orca-cyberespionage-campaign/

沒有留言:

張貼留言