2010
DOI: 10.15394/jdfsl.2010.1082
|View full text |Cite
|
Sign up to set email alerts
|

Malware Forensics: Discovery of the Intent of Deception

Abstract: Malicious software (malware) has a wide variety of analysis avoidance techniques that it can employ to hinder forensic analysis. Although legitimate software can incorporate the same analysis avoidance techniques to provide a measure of protection against reverse engineering and to protect intellectual property, malware invariably makes much greater use of such techniques to make detailed analysis labour intensive and very time consuming. Analysis avoidance techniques are so heavily used by malware that the de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 22 publications
(17 citation statements)
references
References 5 publications
0
13
0
Order By: Relevance
“…In addition, forensic techniques on various tools and plugins more than avoidance analysis techniques. This has become one of the bases for software investigated [3].…”
Section: Literatur Reviewmentioning
confidence: 99%
“…In addition, forensic techniques on various tools and plugins more than avoidance analysis techniques. This has become one of the bases for software investigated [3].…”
Section: Literatur Reviewmentioning
confidence: 99%
“…Vendors may often struggle to detect malware and release signature updates, due to malware developers using anti-forensics and anti-avoidance techniques (Brand, Valli & Woodward, 2010). Vendors were also challenged by the 300% surge in newly released malware specimens throughout (ScanSafe, 2009 malware is targeting devices other than the traditional PC paradigm including; Asymmetric Digital Subscriber Line (ADSL) routers, smart phones and gaming consoles (Čeleda, Krejčí, Vykopal, & Drašar, 2010;Symantec, 2009).…”
Section: Security Challengesmentioning
confidence: 99%
“…As many debuggers or analyzing tools being developed rapidly, some developers try to avoid debugging through anti-debugging APIs or other techniques [2]. To avoid antidebugging techniques, analysts trick binary files as if they are not in the analyzing environments using plug-ins for debuggers.…”
Section: Introductionmentioning
confidence: 99%