Skip to main content
King Abdullah University of Science and Technology
Security Research Bearing Experimental Results
Security Research Bearing Experimental Results

Main navigation

  • Home
  • People
    • All Profiles
    • Principal Investigators
    • Research Scientists
    • Students
    • Alumni
    • Former Members
    • Visiting Scholars
  • Events
    • All Events
    • Events Calendar
  • News
  • Projects
  • Videos

Malware Analysis

Advanced Dynamic and Static Malware Analysis using LLMs

Mon, May 12 2025

Research

Malware Analysis AI LLM Cyber Security

The increasing complexity of malware highlights the need for advanced analysis tools, both static and dynamic, for effective reverse engineering and behavioral analysis of a given sample. While static methods such as disassembly and code review remain crucial, many malware samples use packers and obfuscation techniques that necessitate memory captures and dynamic analysis [Dynamic, 2012]. Similarly, hooking system and API calls at lower levels provides a more comprehensive view of a program’s true behavior. It enables analysts to capture transient execution stages in a multi-layered malware

Ahmar Husain

Visiting Student, Computer, Electrical and Mathematical Sciences and Engineering

Cyber Security Malware Analysis LLM

Security Research Bearing Experimental Results (SeRBER)

Footer

  • A-Z Directory
    • All Content
    • Browse Related Sites
  • Site Management
    • Log in

© 2025 King Abdullah University of Science and Technology. All rights reserved. Privacy Notice