![]() |
10.5120/ijca2016908283 |
Navroop Kaur and Amit Kumar Bindal. Article: A Complete Dynamic Malware Analysis. International Journal of Computer Applications 135(4):20-25, February 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX
@article{key:article, author = {Navroop Kaur and Amit Kumar Bindal}, title = {Article: A Complete Dynamic Malware Analysis}, journal = {International Journal of Computer Applications}, year = {2016}, volume = {135}, number = {4}, pages = {20-25}, month = {February}, note = {Published by Foundation of Computer Science (FCS), NY, USA} }
Abstract
Now a days thousands of malware samples are received by anti-malware companies on daily basis. And these large numbers are send for analysis by a number of automated analysis tools. These tool automatically execute a program in a controlled environment and generate a report describing the program’s behaviour.
This research paper is a contribution towards the Dynamic Malware analysis. The aim is to provide the general malware features found in recent malware by performing dynamic malware analysis using cuckoo sandbox executed on Windows XP (SP3). This paper also discusses the detailed information about techniques & tools used in dynamic malware analysis.
References
- Manuel Egele, Theodoor Scholte, Engin Kirda, Christopher Kruegel, “A Survey on Automated Dynamic Malware Analysis Techniques and Tools”, ACM Computing Surveys Journal, February 2012
- Ulrich Bayer, Engin Kirda, Christopher Kruegel, “Improving the Efficiency of Dynamic Malware Analysis” , 25th Symposium On Applied Computing (SAC), March 2010.
- Gadhiya, Kaushal Bhavsar “Techniques for Malware Analysis”.
- http://www.insectraforensics.com/sandbox-analyzer-proDolly Uppal1, Vishakha Mehra2 and Vinod Verma3, “Basic survey on Malware Analysis, Tools and Techniques”,International Journal on Computational Sciences & Applications (IJCSA), February 2014
- NormanSandbox.http://www.norman.com/microsites/nsic/ , 2009.
- ThreatExpert. http://www.threatexpert.com/ , 2009.
- MalwareAnalysisBasics,http://www.porcupine.org/forensics/forensic-discovery/chapter6.html
- Gabriel Negreira Barbosa,Rodrigo Rubira Branco, “Prevalent Characteristics in Modern Malware”, Black Hat USA 2014
- Ulrich Bayer, Andreas Moser, Christopher Kruegel, and Engin Kirda, “Dynamic Analysis of Malicious Code” , Journal in Computer Virology, Springer Computer Science
- Cuckoo Sandbox, http://cuckoosandbox.org
- Ulrich Bayer, Imam Habibi, Davide Balzarotti ,Engin Kirda , and Christopher Kruegel “A View on Current Malware Behaviors".
- http://www.document-analyzer.net/
- Moser, A., Kruegel, C., and Kirda, E. 2007b, “Limits of static analysis for malware detection” in 23rd Annual Computer Security Applications Conference (ACSAC)
- Anubis. http://anubis.iseclab.org , 2009
- Ed Skoudis, “Malware: Fighting Malicious Code“, dec 2003.
- C. Kruegel, W. Robertson and G. Vigna, “ Detecting Kernel-Level Rootkits Through Binary Analysis” In Annual Computer Security Application Conference (ACSAC), 2004.
Keywords
Malware, Sandbox, Malicious.