Fake AngryBirds App
December 5, 2013

Fake AngryBirds App

Mobile App Inspection For Policy and Malicious Intent. Mobile devices pose a new and significant threat vector for enterprises. Many organizations have deployed Mobile Application Management (MAM) solutions to combat this threat. These solutions enforce policies that protect against mobile attacks but lack intelligence about the mobile applications they manage.

Read More
File Disinfection Framework
July 6, 2012

File Disinfection Framework

File Disinfection Framework implements an advanced dynamic binary analysis on top of a static analysis framework to give developers full control over detection, disinfection and repair of binaries.

Read More
Undocumented PECOFF
July 11, 2011

Undocumented PECOFF

In this paper we will disclose our recent findings about never before seen PE or Portable executable format malformations. These findings have serious consequences on security and reverse engineering tools and lead to multiple exploit vectors.

Read More
Hiding in the Familar
April 3, 2010

Hiding in the Familar

Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. Nyx also searches for viable hidden data that was intentionally cloaked from sight using steganographic principles.

Read More