Context Triggered Piecewise Hashing To Detect Malware Similarity
At Nettitude we collect a large amount of malware binary samples, both from our Honeypot network, from our customers and from incident response. One of the first steps we take is to calculate [...]