Please use this identifier to cite or link to this item:
Title: Malware Analysis
Authors: Chahak
Supervisor: Madan, Sanjay
Verma, Anil Kumar
Keywords: Malware Analysis,;Feature Extraction,;Sandbox Environment,;System Calls
Issue Date: 5-Sep-2017
Abstract: Malwares are a trending menace in today’s cyber world. They are installed surreptitiously in the system and the results are alarmingly dangerous. Many static analysis approaches and anti-virus tools can be bypassed by the malwares. By analyzing the exact behavior, tendency and execution of the code, dynamic malware analyses have somehow overcome these chicaneries. Analyzing the difference between the desired nodes as well as observing the runtime behavior of malware differentiates dynamic behavior from static. An appropriate tool studies the malware in lieu of its behavior, function and execution and is able to handle multiple processes. Objectifying the scope and functionality of a malware sample is the motive of malware analysis. Unfortunately the amount of specimens to be analyzed by the vendors is rapidly growing on a daily basis. Analyzing the sample during execution time is known as Dynamic Analysis whereas Static analysis is done by inspecting the program and Memory Analysis is defined by studying the memory and registry. Using static approaches leads to a huge level of complications and challenges as it limits itself to combat the malicious content due to the unavailability of the source most of the times. Dynamic analysis overcomes these issues and provides detailed information when a monitored program is executed.
Appears in Collections:Masters Theses@CSED

Files in This Item:
File Description SizeFormat 
4829.pdf1.19 MBAdobe PDFThumbnail

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.