Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security IT

The 2008 Malware Challenge 29

John Hering writes "With over 25 papers submitted, the results of the 2008 Malware Challenge are in. Malware has become an ever-present danger in today's connected world: The 2008 Malware Challenge was created to help increase awareness and understanding of the threat associated with malware by challenging contestants to reverse engineer and analyze real world malware from the wild."
This discussion has been archived. No new comments can be posted.

The 2008 Malware Challenge

Comments Filter:
  • Malware and Botnets will be having challenges to reverse engineer us.

    I've already got my Liberty Mutual policy for this... do you?
  • It's funny they made a contest for this because it is just so trivial to analyze this if you have a few minutes to lose.

  • eh? (Score:3, Insightful)

    by MegaFur ( 79453 ) <wyrd0.komy@zzn@com> on Wednesday December 31, 2008 @09:32AM (#26279539) Journal

    I know that Malware is a superset of computer viruses, but most virus scanners are more like malware scanners these days. I understand that the spirit of the challenge is to reverse engineer code that malware checkers currently don't catch, but isn't this a little like giving away for free that which some company down the street is charging money for? Maybe I'm still not getting it.

  • Let's just say ... (Score:2, Insightful)

    by thuerrsch ( 1442235 )
    2008 was another year of malware on the desktop!
  • by gatekeep ( 122108 ) on Wednesday December 31, 2008 @01:15PM (#26282543)

    First of all, this story should probably link to the actual event site. [malwarechallenge.info]

    Secondly, the results have been available since 11/19/08. This is hardly news at this point.

    • by Anonymous Coward

      Great you guys linked to one person's submission, an also ran paper at that. Here is a link to the actual resultS http://www.malwarechallenge.info/results.html

      BTW this new design has slow as all hell javascript (on firefox 3.0.4)

  • In the good old days, security analysts could discover and analyze any malicious mobile code with relative ease. Also, malware functionality was easily visible. Hence, there was no need to perform an in-depth analysis of the malware

    Today, malware writers are aware of the various forensic techniques, using a virtual machine, aware when some tool is being used to unpack a piece of malware, they conceal network traffic, leave a minimal footprint on the system they are trying to infect, providing remote acce
  • I have wondered what would happen to many computer stores if malware and viruses were to cease existance. Would the Best Buy geek squad be the only computer store left? Having worked at small mom and pop shops 99% of our business was removing malware. They were already struggling to compete if not for malware they wouldn't stand a chance.

We are Microsoft. Unix is irrelevant. Openness is futile. Prepare to be assimilated.

Working...