You are on page 1of 11

The Rise of Hyperion X

By
Mic
ha e
T he
l Ti
Info
llin
r
i
m
atio
ITS
nA
101
ge
5-1
259
11

Tech Topic: Hyperion/FX Malware and


Software Assurance Software

Analyze malware to figure out how it works


and prevent any intrusion in the future.

How does it work?

Technical Specs

Company that Started Hyperion X

Future goals for Hyperion X

More Information
Defense Zone
http
://www.defenseone.com/technology/2015/01/researchers-develop-pr
ogram-can-read-malwares-mind/103788/

Oak Ridge National Labratory


https://
www.ornl.gov/news/rk-cyber-solutions-licenses-ornl-malware-detectio
n-technology

Picture References
Oak Ridge Cyber Security Technology Hyperion Offers More Powerful Malware Detection. Hacked. 26 October 2015. https
://hacked.com/oak-ridge-cyber-security-technology-hyperion-offers-powerful-malware-detection /
Cybersecurity Service Licenses ORNL Malware Detection Technology. Oak Ridge National Laboratory. 26 October 2015. http://
www.forensicmag.com/news/2015/02/cybersecurity-service-licenses-ornl-malware-detection-technology
Shuttershock. Gunnar Assmy. 1 November 2015. http://
www.shutterstock.com/pic-105272927/stock-photo-malware-inside-binary-code.html?src=MluA_Q45M5tAL-GToIwiEQ-1-50
NREs Hertel Joins Oak Ridge National Laboratory. Georgia College of Tech Engineering. 1 November 2015. http://
www.coe.gatech.edu/news/nres-hertel-joins-oak-ridge-national-laboratory
Proceed with Caution, Future Ahead. Daily Prompt: Ebb and Flow. 1 November 2015.
https://lifeconfusions.wordpress.com/2013/09/28/proceed-with-caution-future-ahead /
File: Question mark (black on white).png. Wikimedia Commons. 1 November 2015.
https://commons.wikimedia.org/wiki/File:Question_mark_(black_on_white). png
15 Free must-try Android apps on the Google Play store. Tech 2. 1 November 2015. http://
tech.firstpost.com/news-analysis/15-free-must-try-android-apps-on-the-google-play-store-238295.html
Stock Illustration- Privacy Concept: Opened Padlock and Malware on Keyboard. CamStock Photo. 1 November 2015. < http://
www.canstockphoto.com/privacy-concept%3A-opened-padlock-and-17102919.html >

References
"Oak Ridge Cyber Security Technology Hyperion Offers More Powerful Malware." Datacentre Management Org RSS. Datacentre Management, 21 Jan. 2015.
Web. 19 Oct. 2015. http://www.datacentremanagement.org/2015/01/oak-ridge-cyber-security-technology-hyperion-offers-more-powerful-malware /
Munger, Frank. "ORNL's Cyber Warfare Team Showing Results; Hyperion Studies Malware Behavior." KNS. Knoxville News Sentinel, 20 Jan. 2015. Web. 19
Oct. 2015. http://www.knoxnews.com/news/local-news/ornls-cyber-warfare-team-goes-after-bad-guys-hyperion-studies-malware-behavior_50739526
Linger, Rick. "The Hyperion System: Computing So5ware Behavior with Function Extraction Technology." Cyberspace Sciences & Information Intelligence
Group (CISR) Group. Web. 19 Oct. 2015. https
://buildsecurityin.us-cert.gov/sites/default/files/The Hyperion System Computing Software Behavior with Function Extraction Technology-Rick

Linger.pdf

Volume. Cyber Security Division Transition to Practice Technology Guide(n.d.): n. pag. Singup4.net. Department Of Homeland Security. Web. 1 Nov. 2015.
https://www.signup4.net/Upload/TERA10A/TTPI11E/CSD%20TTP%20Technology%20Guide%20Volume%201.pdf
Neil Cross. The Revenge. Download MP3. Neil Cross Production Mus. 2015. https
://www.sounddogs.com/previews/3867/mp3/925200_SOUNDDOGS__ th.mp3

m
m
o
C
?
?
s
s
n
n
o
r
i
t
e
s
c
e
n
u
o
Q
C

?
s
t
en

You might also like