Microsoft Malware Protection Center

Threat Research & Response Blog

Browse by Tags

  • Blog Post: Vulnerability analysis, practical data flow analysis and visualization

    Recently at CanSecWest 2012, we presented on the technology we use for analyzing malicious samples and PoC files. As malware often actively attempts to exploit software vulnerabilities these days, understanding the internals of these vulnerabilities is essential when writing defense logic. Out of...