Title
The other guys: automated analysis of marginalized malware.
Abstract
In order to thwart dynamic analysis and bypass protection mechanisms, malware have been using several file formats and evasive techniques. While publicly available dynamic malware analysis systems are one of the main sources of information for researchers, security analysts and incident response professionals, they are unable to cope with all types of threats. Therefore, it is difficult to gather information from public systems about CPL, .NET/Mono, 64-bits, reboot-dependent, or malware targeting systems newer than Windows XP, which result in a lack of understanding about how current malware behave during infections on modern operating systems. In this paper, we discuss the challenges and issues faced during the development of this type of analysis system, mainly due to security features available in NT 6.x kernel versions of Windows OS. We also introduce a dynamic analysis system that addresses the aforementioned types of malware as well as present results obtained from their analyses.
Year
DOI
Venue
2018
10.1007/s11416-017-0292-8
J. Computer Virology and Hacking Techniques
Keywords
Field
DocType
Malware analysis systems, Evasive malware, OS security, 64-Bit systems, CPL malware, .Net malware
File format,Cryptovirology,Microsoft Windows,Computer security,Computer science,Asprox botnet,Social exclusion,Cyber-collection,Malware,Malware analysis
Journal
Volume
Issue
ISSN
14
1
2263-8733
Citations 
PageRank 
References 
0
0.34
18
Authors
3
Name
Order
Citations
PageRank
Marcus Botacin122.74
Paulo Lício de Geus28313.37
André Ricardo Abed Grégio3669.51