Matt Wolff

Learn More
Sophisticated malware authors can sneak hidden malicious code into portable exe-cutable files, and this code can be hard to detect, especially if encrypted or compressed. However, when an executable file switches between code regimes (e.g., native, en-crypted, compressed, text, and padding), there are corresponding shifts in the file's representation as an(More)
  • 1