2010 Information Security Curriculum Development Conference 2010
DOI: 10.1145/1940941.1940944
|View full text |Cite
|
Sign up to set email alerts
|

Malware analysis reverse engineering (MARE) methodology & malware defense (M.D.) timeline

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…DCAM is a static malware detection technique using code disassembly to recognize malware variants based on a common core signature with promising results on a set of malware [33]. MARE introduced a four-stage approach covering a structured analysis process that focuses on producing an objective outcome to detect malware followed by isolation and extraction phases, as shown by [34], who introduced the malware behavioral technique, malware reverse engineering, and code analysis. The author in [35] proposed an automated analysis framework to analyze executable behaviors through a synergic combination of malware detection techniques, including using a virtual machine over a sandbox to enhance invisibility.…”
Section: E Methodologies Deployed In Malware Analysismentioning
confidence: 99%
“…DCAM is a static malware detection technique using code disassembly to recognize malware variants based on a common core signature with promising results on a set of malware [33]. MARE introduced a four-stage approach covering a structured analysis process that focuses on producing an objective outcome to detect malware followed by isolation and extraction phases, as shown by [34], who introduced the malware behavioral technique, malware reverse engineering, and code analysis. The author in [35] proposed an automated analysis framework to analyze executable behaviors through a synergic combination of malware detection techniques, including using a virtual machine over a sandbox to enhance invisibility.…”
Section: E Methodologies Deployed In Malware Analysismentioning
confidence: 99%
“…While headers contain information about the program itself and data to be read by the OS in order to correctly load and execute the file, sections contain the actual code and data of the program. Figure 1 shows the methodology used to analyze the sample, partially based on previous works [70,71]. We depict each step (gray, rounded rectangle) and the tools used (inside each rectangles).…”
Section: Ransomware Analysismentioning
confidence: 99%
“…Until the dawn of the second decade of the 21 st century, there weren't any structured methodologies available for MA. MARE [5] was created to fill that gap. The researchers of MARE developed a Malware Defense (M.D.)…”
Section: Mare (Malware Analysis Reverse Engineering)mentioning
confidence: 99%
“…As one more of the countless problems faced, it needs a methodology developed to tackle it. There were no structured methodologies developed until 2010 when the MARE methodology (Malware Analysis Reverse Engineering) [5] was presented. This can be considered the only available methodology and go to solution until recent days.…”
Section: Introductionmentioning
confidence: 99%