Author Archive uob_admin

Malicious Portable Executables Scoring Methodology using Evidence Combinational Theory with Fuzzy Hashing.

You are invited to ACM Event for Monday 20th June, 2016 holding in Horton D 0.15  at 2.00pm. The event is an academic talk with the presentation details:
Speaker:   Anitta Patience Namanya

Topic :        

Malicious Portable Executables Scoring Methodology using Evidence Combinational Theory with Fuzzy Hashing.

 
Abstract:

Malware detection and prevention n systems are bypassed by malicious file in computer systems as malware become more complex and vast in number. With the growing need for high performance secure systems, new, efficient and faster malware detection algorithms are required. This implies that better alternatives present day methods have developed or existing methods need to be optimised with new approaches. Fuzzy hashing is an existing static method that has been adopted for sample triaging in malware analysis and detection to speed up the malware analysis processes. File similarity is used to cluster malware into families whose common signature can then be designed. This work explores some of the different hashing techniques that are used in malware analysis now. Although each hashing technique produces interesting results independently, detection of malicious samples based on these results is misleading. Therefore, this study introduces and investigates how different hashing results can be combined to achieve better detection rates. Two evidence combination theory based methods are applied in this work in order propose a novel way of combining the results achieved from different hashing algorithms. Our results show that the detection rates are improved when evidence combination techniques are applied.


Contents :

  • Introduction – The world of malware evolution.
  • Problem statement
  • Aims and Objectives
  • My contribution to safer computing.
  • Background:
    • Hashing Algorithms
    • Evidence Combinational theory
  • Related Works
  • Proposed method design and architecture
  • Evaluation methods
  • Experimentation setup and scenarios
  • Initial study results and analysis
  • Extended study results and analysis
  • Why does this method work and why is it better?
  • Conclusion and future work.
  • Acknowledgments
  • Q&A

Celebrating Success with Anitta Patience Namanya

We are delighted once again to announce that Anitta Patience Namanya, the University of Bradford ACaM Chapter Secretary has been offered a Scholarship following the acceptance of her poster paper: Malicious PE Static Scoring method using Evidence Combinational Theory with Fuzzy Hashing to attend the ACM-W
Europe Celebration of Women in computing: womENcourage 2016 Conference to be held in Linz, Austria on September 12th and 13th, 2016. This is her second award in less than 12 months, the first being A framework for automated hybrid signature generation for Portable Executable malware detection which was selected as the 2nd top at the ACM-W UK Inspire 2015 Poster Competition held on October 28, 2015 at Imperial College London.

 

Congratulations Anitta,

University of Bradford ACM Student Chapter is proud of you, best wishes in your research.

Fault Tolerance In Cloud Computing Environment

Our next seminar presentation is scheduled as follows:

Speaker: Bashir Mohammed
Date: Monday 18th April, 2016
Venue: Horton D 0.15
Presentation Time:   2.00   –   2.15pm
Question Time           2.15   –   2.30pm
Topic :        Fault Tolerance In Cloud Computing Environment
Outline:
      Introduction
      Research 1- Analysis of Cloud Testbed using OSS
      Research 2 – Experimental Case Study using Openstack
      Research 3 – Fail Over Strategy for Fault Tolerance in Cloud
      Research Progression
      Conclusion & Future Work
 The event will last for 30 minutes and  promises to be interesting.
See you there.

ACM Events Calendar For 2016/2017

The following are interim events for the Chapter for the 2016/2017 academic session.

ACM-Events-2016-2017

We are Co-Sponsors of the 32nd UKPEW and CyberSec Workshop

The chapter is cosponsoring the 32nd UKPEW and CyberSec Workshop to be held between 8-9th Sept 2016 at the University of Bradford. More details in the flyer below.

32nd-UKPEW-and-CyberSecW-2016-Poster_A3v3