Ulrich Bayer

Learn More
Anti-malware companies receive thousands of malware samples every day. To process this large quantity, a number of automated analysis tools were developed. These tools execute a malicious program in a controlled environment and produce reports that summarize the program’s actions. Of course, the problem of analyzing the reports still remains. Recently,(More)
Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be able to develop effective detection techniques for malicious code. In addition, it is an important prerequisite for the development of removal tools that can thoroughly delete(More)
Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be able to develop effective detection techniques for malicious code. In addition, it is an important prerequisite for the development of removal tools that can thoroughly delete(More)
Each day, security companies see themselves confronted with thousands of new malware programs. To cope with these large quantities, researchers and practitioners alike have developed dynamic malware analysis systems. These systems automatically execute a program in a controlled environment and produce a report describing the program's behavior. During the(More)
We are witnessing an increasing complexity in the malware analysis scenario. The usage of polymorphic techniques generates a new challenge: it is often difficult to discern the instance of a known polymorphic malware from that of a newly encountered malware family, and to evaluate the impact of patching and code sharing among malware writers in order to(More)
In the escalating arms race between malicious code and security tools designed to analyze it, detect it or mitigate its impact, malicious code running inside the operating system kernel provides an extremely powerful tool. Kernel-level code can introduce hard to detect backdoors, provide stealth by hiding files, processes or other resources and in general(More)
  • R Klar, U Bayer
  • International journal of bio-medical computing
  • 1990
Induced mainly by the increased spreading of personal computers in the last few years computer-assisted instruction (CAI) systems for medicine have been developed on a large scale. Proven structure principles are above all the simulation of patient management in a problem-orientated approach, the mathematical simulation of (patho-) physiological functions(More)
The Ca2 /calmodulin (CaM)-dependent protein kinase II (CaMKII) has morphogenic functions in neurons not shared by the isoform. CaMKII contains three exons (v1, v3, and v4) not present in the CaMKII gene, and two of these exons (v1 and v4) are subject to differential alternative splicing. We show here that CaMKII , but not , mediated bundling of F-actin(More)