SecHaqMalware Analysis of a Cryptocurrency Miner — Part 4More static code analysisFeb 8, 2021Feb 8, 2021
SecHaqEvaluating the PerformanceWe’ll need to evaluate the performance of the detector built to ensure that we are achieving a higher true positive rate than a false…Jan 5, 2021Jan 5, 2021
SecHaqApplying Data Science to Malware — Part 3Now we will build a machine learning detector. In order to build a machine learning detector, we need to extract a substantial amount of…Dec 30, 2020Dec 30, 2020
SecHaqApplying Data Science to Malware — 1With Malware exploding in numbers, I decided to learn and apply Data Science to Malware.Nov 30, 2020Nov 30, 2020