CFP last date
22 July 2024
Call for Paper
August Edition
IJCA solicits high quality original research papers for the upcoming August edition of the journal. The last date of research paper submission is 22 July 2024

Submit your paper
Know more
Reseach Article

A Complete Dynamic Malware Analysis

by Navroop Kaur, Amit Kumar Bindal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 135 - Number 4
Year of Publication: 2016
Authors: Navroop Kaur, Amit Kumar Bindal
10.5120/ijca2016908283

Navroop Kaur, Amit Kumar Bindal . A Complete Dynamic Malware Analysis. International Journal of Computer Applications. 135, 4 ( February 2016), 20-25. DOI=10.5120/ijca2016908283

@article{ 10.5120/ijca2016908283,
author = { Navroop Kaur, Amit Kumar Bindal },
title = { A Complete Dynamic Malware Analysis },
journal = { International Journal of Computer Applications },
issue_date = { February 2016 },
volume = { 135 },
number = { 4 },
month = { February },
year = { 2016 },
issn = { 0975-8887 },
pages = { 20-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume135/number4/24038-2016908283/ },
doi = { 10.5120/ijca2016908283 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:34:50.553393+05:30
%A Navroop Kaur
%A Amit Kumar Bindal
%T A Complete Dynamic Malware Analysis
%J International Journal of Computer Applications
%@ 0975-8887
%V 135
%N 4
%P 20-25
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now a days thousands of malware samples are received by anti-malware companies on daily basis. And these large numbers are send for analysis by a number of automated analysis tools. These tool automatically execute a program in a controlled environment and generate a report describing the program’s behaviour. This research paper is a contribution towards the Dynamic Malware analysis. The aim is to provide the general malware features found in recent malware by performing dynamic malware analysis using cuckoo sandbox executed on Windows XP (SP3). This paper also discusses the detailed information about techniques & tools used in dynamic malware analysis.

References
  1. Manuel Egele, Theodoor Scholte, Engin Kirda, Christopher Kruegel, “A Survey on Automated Dynamic Malware Analysis Techniques and Tools”, ACM Computing Surveys Journal, February 2012
  2. Ulrich Bayer, Engin Kirda, Christopher Kruegel, “Improving the Efficiency of Dynamic Malware Analysis” , 25th Symposium On Applied Computing (SAC), March 2010.
  3. Gadhiya, Kaushal Bhavsar “Techniques for Malware Analysis”.
  4. http://www.insectraforensics.com/sandbox-analyzer-proDolly Uppal1, Vishakha Mehra2 and Vinod Verma3, “Basic survey on Malware Analysis, Tools and Techniques”,International Journal on Computational Sciences & Applications (IJCSA), February 2014
  5. NormanSandbox.http://www.norman.com/microsites/nsic/ , 2009.
  6. ThreatExpert. http://www.threatexpert.com/ , 2009.
  7. MalwareAnalysisBasics,http://www.porcupine.org/forensics/forensic-discovery/chapter6.html
  8. Gabriel Negreira Barbosa,Rodrigo Rubira Branco, “Prevalent Characteristics in Modern Malware”, Black Hat USA 2014
  9. Ulrich Bayer, Andreas Moser, Christopher Kruegel, and Engin Kirda, “Dynamic Analysis of Malicious Code” , Journal in Computer Virology, Springer Computer Science
  10. Cuckoo Sandbox, http://cuckoosandbox.org
  11. Ulrich Bayer, Imam Habibi, Davide Balzarotti ,Engin Kirda , and Christopher Kruegel “A View on Current Malware Behaviors".
  12. http://www.document-analyzer.net/
  13. Moser, A., Kruegel, C., and Kirda, E. 2007b, “Limits of static analysis for malware detection” in 23rd Annual Computer Security Applications Conference (ACSAC)
  14. Anubis. http://anubis.iseclab.org , 2009
  15. Ed Skoudis, “Malware: Fighting Malicious Code“, dec 2003.
  16. C. Kruegel, W. Robertson and G. Vigna, “ Detecting Kernel-Level Rootkits Through Binary Analysis” In Annual Computer Security Application Conference (ACSAC), 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Malware Sandbox Malicious.