Evaluating Untrusted Software In a Controlled Environment

Tools and techniques of reverse engineering allow the professional analyst to identify and describe in detail the behavior of malicious software in a test lab environment. However, many users and organizations lack both the resources and time to subject untrusted software to such stringent tests....
By
Jeff Reava
June 20, 2002

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg