Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Static analysis extracts indicators from the malicious code of the binary files. However due to obfuscation and packing techniques, it is often difficult to detect

Static analysis extracts indicators from the malicious code of the binary files. However due to obfuscation and packing techniques, it is often difficult to detect malware only by static analysis. For packed malware, a self-modifying unpacking program unpack the malicious PE and then it is loaded into memory for execution. When malware is executed in a sandbox, runtime behaviour of malware can be extracted including creations of files and folders, functions and library calls, modification in the registries, addition of new services, creation and modification of processes, process injections, modifications in the stratup programs, and installations of new applications. Attackers try to leave as less traces as possible in the file system or disk. So memory forensic is becoming a critical tool to extract the runtime behaviour of malware and detect the malware.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Processing

Authors: David M. Kroenke, David Auer

11th Edition

B003Y7CIBU, 978-0132302678

More Books

Students also viewed these Databases questions

Question

The company has fair promotion/advancement policies.

Answered: 1 week ago