TWMAN / MiTThis open source project will not update anymore.
Taiwan Malware Analysis Net (抬丸郎)
The Developer of TWMAN+ who would like to thanks National University of Tainan in Taiwan, National Cheng Kung University in Taiwan and Acer eDC in Taiwan for their kindly supporting this Open Source Research Project.
In addition, the Developer also thanks the National Science Council in Taiwan for financially supporting under the Grant NSC99-2911-I-024-004, and National Center for High-Performance Computing in Taiwan for previous version of this project (TWMAN) supported during 2008/11/17 to 2011/09/28. Finally, TWMAN+ is Developed and Copyrighted by TonTon Hsien-De Huang and which is licensed under GNU General Public License version 3.
Core By Truman 0.1 (SecureWorks@Dell) | Licensed under GNU General Public License version 3. Developer & Copyrighted by : TonTon Hsien-De Huang
- 國立臺南大學(NUTN)與安碁資訊股份有限公司(Acer eDC)建教合作計畫-惡意程式分析平台 (2012/05/01-2012/10/31)
- NSC99-2911-I-024-004 (2010/12/01-2012/04/30)：99年度台灣與英國頂尖大學前期合作研究計畫: 第二型模糊知識本體模型與應用 (2010 Initiative Research Cooperation among Top Universities between UK and Taiwan: Type-2 Fuzzy Ontology Model and Its Applications)
- NSC 98-2221-E-024-009-MY3 (2009/08-2012/07)：基於第二型Fuzzy Ontology之智慧型代理人於健康照護應用 (Type-2 Fuzzy Ontology based Intelligent Agent for Healthcare Application)
- NSC 99-2218-E-492-006 (~2011/09/28)：系統安全保證及反駭客控制環境建置與雲端資訊安全機制研發計畫(II)
Malware Analysis Network in Taiwan (抬丸郎)
分層 區間二型模糊 知識本體模型 之 複合惡意程式行為分析 系統
A Hierarchical IT2FO Model for Hybrid Malware Behavior Analysis System(1.) Applying Interval Type-2 Fuzzy Ontology model for malware behavioral . (2.) Applying Data Mining and Social Network approach to malware behavior identify. (3.) Integrate DRBL with KVM to be a Heterogeneous ( Virtual/Physical) Architecture (include x86, ARM ). (4.) Release a Free Cloud Drive for Share malicious sample and analyze report. (5.) Published some papers on IEEE Conferences or Journals.
H. D. Huang, C. S. Lee, M. H. Wang, and H. Y. Kao, "IT2FS-based ontology with soft-computing mechanism for malware behavior analysis," Soft Computing, vol. 18, no. 2, pp. 267-284, 2014.
Also, you can read this article: 惡意程式分析 / 惡意程式行為分析 (Malware Analysis / Malware Behavioral Analysis)
Install / Setup User Guide: 請務必先撥空讀過下面說明及中文網誌
Chinese Version: http://blog.twman.org/2013/10/MiT-install-guide.html
The Developer who would like to thanks Mr. Jazz Yao-Tsung Wang, Mr. Figaro Chen-Ho Yang, Dept. Computer Science and Information Engineering (CSIE) in National Cheng-Kung University (NCKU), Dept. Information and Learning Technology (ILT), National University of Tainan (Taiwan) for their kindly supporting this Research Project.