SecHaqMalware Analysis of a Cryptocurrency Miner — Part 4More static code analysis3 min read·Feb 8, 2021----
SecHaqMalware Analysis of a Cryptocurrency Miner — Part 3Static code analysis4 min read·Feb 3, 2021----
SecHaqEvaluating the PerformanceWe’ll need to evaluate the performance of the detector built to ensure that we are achieving a higher true positive rate than a false…3 min read·Jan 5, 2021----
SecHaqApplying Data Science to Malware — Part 3Now we will build a machine learning detector. In order to build a machine learning detector, we need to extract a substantial amount of…5 min read·Dec 30, 2020----
SecHaqApplying Data Science to Malware — 1With Malware exploding in numbers, I decided to learn and apply Data Science to Malware.4 min read·Nov 30, 2020----