Abstract | ||
---|---|---|
In order to thwart dynamic analysis and bypass protection mechanisms, malware have been using several file formats and evasive techniques. While publicly available dynamic malware analysis systems are one of the main sources of information for researchers, security analysts and incident response professionals, they are unable to cope with all types of threats. Therefore, it is difficult to gather information from public systems about CPL, .NET/Mono, 64-bits, reboot-dependent, or malware targeting systems newer than Windows XP, which result in a lack of understanding about how current malware behave during infections on modern operating systems. In this paper, we discuss the challenges and issues faced during the development of this type of analysis system, mainly due to security features available in NT 6.x kernel versions of Windows OS. We also introduce a dynamic analysis system that addresses the aforementioned types of malware as well as present results obtained from their analyses. |
Year | DOI | Venue |
---|---|---|
2018 | 10.1007/s11416-017-0292-8 | J. Computer Virology and Hacking Techniques |
Keywords | Field | DocType |
Malware analysis systems, Evasive malware, OS security, 64-Bit systems, CPL malware, .Net malware | File format,Cryptovirology,Microsoft Windows,Computer security,Computer science,Asprox botnet,Social exclusion,Cyber-collection,Malware,Malware analysis | Journal |
Volume | Issue | ISSN |
14 | 1 | 2263-8733 |
Citations | PageRank | References |
0 | 0.34 | 18 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Marcus Botacin | 1 | 2 | 2.74 |
Paulo Lício de Geus | 2 | 83 | 13.37 |
André Ricardo Abed Grégio | 3 | 66 | 9.51 |