Abstract

Malware attacks are creating huge inconveniences for organizations and security experts. Due to insecure web applications, small businesses and personal systems are the most vulnerable targets of malware attacks. In the wake of this burgeoning cyber security breach, this article propositions a framework for a complete malware analysis process including dynamic analysis, static analysis, and reverse engineering process. Further, the article provides an approach of malicious code identification, mitigation, and management through a hybrid process of malware analysis, priority-based vulnerability mitigation process and various source code management approaches. The framework delivers a combined package of identification, mitigation and management that simplifies the process of malicious code handling. The proposed framework also gives a solution for reused codes in software industry. Successful implementation of the framework will make the code more robust in the face of unexpected behavior and deliver a revolutionary stage wise process for malicious code handling in software industry.

Highlights

  • The present cyberspace is imploding with attacks and breaches

  • Authors of this study provide some data in order to validate their results and framework workflow

  • If we look at this framework deeply, it is a full bundle supply of ready to use codes

Read more

Summary

INTRODUCTION

The present cyberspace is imploding with attacks and breaches. Easy access to internet and quality less security mechanism has created much unusual and dangerous vulnerability in the current digital world. Malware is the software that has some malicious or harmful set of operation or instructions in their source code for performing a malicious activity in a system or network [2]. The growing and expansive rate of software industry creates the need to reuse codes for coders with some improvements instead of writing a new one. The authors characterize the system for extricating secure great codes with malware examination and besides this portray the need and criticalness of the structure. After this clarification, in the last segment, the authors posit the conclusion and enunciate efforts directed towards future work

PREVIOUS RESEARCH INITIATIVES
IMPORTANCE OF REUSED CODES
WHY MALWARE ANALYSIS?
FRAMEWORK
Phase 2
Phase 3
SIGNIFICANCE OF THE FRAMEWORK
Findings
CONCLUSION AND FUTURE WORK
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call