no code implementations • 26 Jul 2018 • Silvia Bonomi, Marco Casini, Claudio Ciccotelli
This process, called Chain of Custody (CoC), must ensure that evidences are not altered during the investigation, despite multiple entities owned them, in order to be admissible in a legal court.
Cryptography and Security
1 code implementation • 4 Sep 2017 • Luca Massarelli, Leonardo Aniello, Claudio Ciccotelli, Leonardo Querzoni, Daniele Ucci, Roberto Baldoni
An important task of malware analysis is the classification of malware samples into known families.
Cryptography and Security