This is in reference to some experiments and on going work on PE header analysis of binaries to identify whether a binary is malicious or non-malicious.
It is made out that looking at PE header itself, one can make out that the captured binaries are suspicious, malicious or not.
This is in reference to some experiments and on going work on PE header analysis of binaries to identify whether a binary is malicious or non-malicious.
It is made out that looking at PE header itself, one can make out that the captured binaries are suspicious, malicious or not.
What do y...
[ more ]