Talk With an Expert

Reverse Engineering of WannaCry Worm and Anti Exploit Snort Rules

Reverse Engineering of WannaCry Worm and Anti Exploit Snort Rules (PDF, 2.65MB)Published: 27 May, 2018
Created by
Hirokazu Murakami

Today, a lot of malware is being created and utilized. To solve this problem, many researchers study technologies that can quickly respond automatically to detected malware. Using artificial intelligence (AI) is such an example. However, modern AI has difficulty responding to new attack methods. On the other hand, malware consists of variants, and the root (core) part often uses the same technology. Therefore, I think that if we can identify that core part of malware through analysis, we can identify many variants as well. Consider the possibility of reverse engineering to identify countermeasures from malware analysis results.