Author Archives: Irfan Ul Haq

Replay PANDA malware recordings

PANDA provides a record and replay system. It executes a binary, records its execution and later provides the facility to replay the recording. A huge number of malware recordings exist on http://panda.gtisc.gatech.edu/malrec/. But before you may run the replay, you need … Continue reading

Posted in Binary Analysis, Dynamic analysis, Linux, Malware Analysis, Security | Tagged , , , , | Leave a comment

How to change bibliography font size in Latex

Few conferences allow to use separate font size for bibliography. Here is how you can set a different font size for Reference section alone. Place following command before bibliography section: \def\bibfont{\footnotesize} You should make sure that you use appropriate command in … Continue reading

Posted in Latex | Tagged , , , | Leave a comment

Ayudante: Identifying Undesired Variable Interactions

Irfan Ul Haq, Juan Caballero, and Michael D. Ernst WODA 2015 13th International Workshop on Dynamic Analysis (WODA) October 26, 2015, Pittsburgh, PA, USA. Abstract: A common programming mistake is for incompatible variables to interact, e.g., storing euros in a variable that should … Continue reading

Posted in Debugging, Software Engineering, Testing | Tagged , , , , , , , , , , | Leave a comment

On Mitigating Sampling-Induced Accuracy Loss in Traffic Anomaly Detection Systems

Sardar Ali, Irfan Ul Haq, Sajjad Rizvi, Naurin Rasheed, Unum Sarfraz, Syed Ali Khayam, and Fauzan Mirza ACM SIGCOMM Computer Communication Review (CCR) Volume 40, Issue 3, July 2010, ACM New York, NY, USA. Abstract: Real-time Anomaly Detection Systems (ADSs) use packet … Continue reading

Posted in Security | Tagged , , | Leave a comment

What is the Impact of P2P Traffic on Anomaly Detection?

Irfan Ul Haq, Sardar Ali, Hassan Khan, and Syed Ali Khayam 13th International Symposium on Recent Advances in Intrusion Detection (RAID) September 15-17, 2010, Ottawa, Canada. Acceptance Rate = 23.1% Abstract: Recent studies estimate that peer-to-peer (p2p) traffic comprises 40-70% of … Continue reading

Posted in Security | Tagged , , , , | Leave a comment

Decaf trace reader installation program

First of all, there is no configuration file, as mentioned in INSTALL file, inside trace_reader directory. You should not worry about it. When you run ‘make’ command, sometime compiler raises error for various undefined functions. You should make sure that binutils-multiarch … Continue reading

Posted in Binary Analysis, Linux | Tagged , | Leave a comment

Packers and Unpackers

Generic Unpacker OmniUnpack: Fast, Generic, and Safe Unpacking of Malware by Lorenzo Martignoni Attacks on Generic Unpacker Denial-of-Service Attacks on Host-Based Generic Unpackers by Limin Liu, Jiang Ming, Zhi Wang, Debin Gao and Chunfu Jia

Posted in Binary Analysis, Malware Analysis, Security | Tagged , , , , | Leave a comment