Reverse engineering on protected malware

Over time, we analyze many malware samples using reverse engineering to obtain and understand their real functionality. This process is an arduous task that may take some time depending on the complexity of the malware itself and the packer or packers used

Quality measures in classification algorithms

Accuracy and coverage are two of the most commonly used measures to evaluate the performance of a classification algorithm. Both measure how well behaved the algorithm, but from a different point of view. In this post we will give an

Microsoft, how old am I?

A few days ago the most important conference of Microsoft developers ended, // Build. They explained the latest advances in technologies  and  the company’s vision. It was also showed apublic a tool for a demo in which they could detect faces

Surviving in the console (Part I)

Normally computer users cannot live without using a mouse because graphical interfaces that exist today force us to use it in 90% of the cases. For those who are like me that even programm in vim (which we tuned to look like a

DTL, privacy and transparency for the user

Data Transparency Lab, a community of technologists, researchers, policymakers and industry representatives working to advance online personal data privacy through scientific research and design. And how can you do this? Investing and betting on good ideas. Until May 15 the first DTL call for proposals is

Torifying all the computer

It is often necessary to connect to the Tor network for multiple reasons. Mainly for anonymity, but some others are due to the possibility of using different IP addresses easily. In recent experiments I have needed a huge amount of data from certain