Automate the Hunt for Malicious Binaries with Data Science Techniques
Analysis of malicious code is a complex topic. Experienced malware analysts know what to look for, enabling them to take a scaffolding approach in their thinking and referencing of behaviors and other data related to malicious code. Essentially, an experienced analyst is able to inspect code of interest within a malicious context and quickly identify known malicious behaviors and relationships to formerly known malicious attacks. However, even the most experienced analyst still confronts the challenge of an ever-increasing large-scale data environment and the identification of potentially unknown malicious behavior.