Research Article

A Complete Dynamic Malware Analysis

by  Navroop Kaur, Amit Kumar Bindal
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 135 - Issue 4
Published: February 2016
Authors: Navroop Kaur, Amit Kumar Bindal
10.5120/ijca2016908283
PDF

Navroop Kaur, Amit Kumar Bindal . A Complete Dynamic Malware Analysis. International Journal of Computer Applications. 135, 4 (February 2016), 20-25. DOI=10.5120/ijca2016908283

                        @article{ 10.5120/ijca2016908283,
                        author  = { Navroop Kaur,Amit Kumar Bindal },
                        title   = { A Complete Dynamic Malware Analysis },
                        journal = { International Journal of Computer Applications },
                        year    = { 2016 },
                        volume  = { 135 },
                        number  = { 4 },
                        pages   = { 20-25 },
                        doi     = { 10.5120/ijca2016908283 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2016
                        %A Navroop Kaur
                        %A Amit Kumar Bindal
                        %T A Complete Dynamic Malware Analysis%T 
                        %J International Journal of Computer Applications
                        %V 135
                        %N 4
                        %P 20-25
                        %R 10.5120/ijca2016908283
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Now a days thousands of malware samples are received by anti-malware companies on daily basis. And these large numbers are send for analysis by a number of automated analysis tools. These tool automatically execute a program in a controlled environment and generate a report describing the program’s behaviour. This research paper is a contribution towards the Dynamic Malware analysis. The aim is to provide the general malware features found in recent malware by performing dynamic malware analysis using cuckoo sandbox executed on Windows XP (SP3). This paper also discusses the detailed information about techniques & tools used in dynamic malware analysis.

References
  • Manuel Egele, Theodoor Scholte, Engin Kirda, Christopher Kruegel, “A Survey on Automated Dynamic Malware Analysis Techniques and Tools”, ACM Computing Surveys Journal, February 2012
  • Ulrich Bayer, Engin Kirda, Christopher Kruegel, “Improving the Efficiency of Dynamic Malware Analysis” , 25th Symposium On Applied Computing (SAC), March 2010.
  • Gadhiya, Kaushal Bhavsar “Techniques for Malware Analysis”.
  • http://www.insectraforensics.com/sandbox-analyzer-proDolly Uppal1, Vishakha Mehra2 and Vinod Verma3, “Basic survey on Malware Analysis, Tools and Techniques”,International Journal on Computational Sciences & Applications (IJCSA), February 2014
  • NormanSandbox.http://www.norman.com/microsites/nsic/ , 2009.
  • ThreatExpert. http://www.threatexpert.com/ , 2009.
  • MalwareAnalysisBasics,http://www.porcupine.org/forensics/forensic-discovery/chapter6.html
  • Gabriel Negreira Barbosa,Rodrigo Rubira Branco, “Prevalent Characteristics in Modern Malware”, Black Hat USA 2014
  • Ulrich Bayer, Andreas Moser, Christopher Kruegel, and Engin Kirda, “Dynamic Analysis of Malicious Code” , Journal in Computer Virology, Springer Computer Science
  • Cuckoo Sandbox, http://cuckoosandbox.org
  • Ulrich Bayer, Imam Habibi, Davide Balzarotti ,Engin Kirda , and Christopher Kruegel “A View on Current Malware Behaviors".
  • http://www.document-analyzer.net/
  • Moser, A., Kruegel, C., and Kirda, E. 2007b, “Limits of static analysis for malware detection” in 23rd Annual Computer Security Applications Conference (ACSAC)
  • Anubis. http://anubis.iseclab.org , 2009
  • Ed Skoudis, “Malware: Fighting Malicious Code“, dec 2003.
  • C. Kruegel, W. Robertson and G. Vigna, “ Detecting Kernel-Level Rootkits Through Binary Analysis” In Annual Computer Security Application Conference (ACSAC), 2004.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Malware Sandbox Malicious.

Powered by PhDFocusTM