Show simple item record

dc.contributor.authorSyed, Ahmed
dc.description.abstractIn the ethereal world of information security, threats posed by virii, and malware to an organisation’s business critical assets, on the perimeter or otherwise, is a matter of great importance. Identifying potential vulnerabilities and the prevention of their being exploited is equally crucial. Ascertaining threats and discovering threat sources whilst developing solutions against the aforesaid threats is of significance. Methods there are, to guard against known threats, however a disparity there exists where unknown virii and malware fly under the radar of detection, and thereby exposing businesses to risk, and to compound the threat, their discovery and remediation are assigned to security teams with limited training, resources, and toolset. The Halla tool, the object of the research herein, seeks to bridge the observed chasm. Its design, construction, architecture, and deployment shall be examined whilst relevant works in the field shall be studied with their potential shortcomings stressed.en_US
dc.publisherNorth Dakota State Universityen_US
dc.rightsNDSU policy 190.6.2en_US
dc.titleMalus Binary Analyses where Antivirii Ceaseen_US
dc.typeThesisen_US
dc.date.accessioned2021-01-15T18:24:55Z
dc.date.available2021-01-15T18:24:55Z
dc.date.issued2019
dc.identifier.urihttps://hdl.handle.net/10365/31728
dc.rights.urihttps://www.ndsu.edu/fileadmin/policy/190.pdfen_US
ndsu.degreeMaster of Science (MS)en_US
ndsu.collegeEngineeringen_US
ndsu.departmentComputer Scienceen_US
ndsu.programComputer Scienceen_US
ndsu.advisorMagel, Kenneth


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record