Abstract
Malicious code is a serious issue which regularly threatens the security of computer systems and act as a challenging task for cyber security& Information security personals. Malicious code is named differently according to their specification such as virus, worm, Trojan, Rootkit, spam etc. Risk factor due to malwares increases exponentially with the advancement in technology. Malware analysis is divided into code (static) analysis, behavioral (dynamic) analysis. It depends upon the investigator to use the different tools and techniques for analysis. Static analysis is first line of defense against malware which is composed of malware detector and scanners. With the advancement in technology, Malware developer uses different kind of techniques to maintain its source code hide from these detectors or scanner to find out hash value, finding strings, pattern matching etc. to identify the malware. Whereas, malware analyst decompress the packed file into unpacked file & investigate obfuscated malwares. In this paper, we try to investigate the different tool and techniques used in malware over practical working malwares.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.