Documenting Malware for Research

Posted on September 08, 2022 in malware • 3 min read

Introduction

When I first began my PhD, my advisor suggested I go through various malware source codes (released openly on the Internet) to compile, execute, understand, and document them for future use.

This inevitably paid off, in that it helped me more easily create ground-truth for my datasets and experiments …


Continue reading

Things I Use

Posted on January 01, 2021 in misc • 1 min read

Personal

Software …


Continue reading

Benchmarking Neo4j

Posted on May 19, 2019 in coding-fun • 4 min read

Introduction

Neo4j is a graph database implementation. It's used for creating large graphs to efficiently create and query various relationships. For an explanation on the differences between graph databases and relational database (like MySQL and PostgreSQL), see https://neo4j.com/developer/graph-db-vs-rdbms/.

I required Neo4j for one of my projects …


Continue reading

Converting Protonmail's VCF files to import to phone

Posted on May 19, 2019 in coding-fun • 1 min read

Introduction

Protonmail captured my interest a few years ago as privacy-focused alternative to Gmail.

But one of the problems I faced was my dependence on Google's Contacts service which kept all of my contacts for me stored on my Android device. I wanted to move away from this as well …


Continue reading

Datasets

Posted on January 01, 2019 in misc • 1 min read

This is a good website for lots of general cyber security datasets: http://www.secrepo.com/

Malware Samples:

Gathering Data:


Continue reading