Systematic approach to malware analysis (SAMA)

J Bermejo Higuera, C Abad Aramburu… - Applied Sciences, 2020 - mdpi.com
Featured Application The systematic and methodological process of analysis described in
this document will provide a complete understanding of the life cycle of a malware specimen …

Your sandbox is blinded: Impact of decoy injection to public malware analysis systems

K Yoshioka, Y Hosobuchi, T Orii… - Information and Media …, 2011 - jstage.jst.go.jp
As malware, such as computer viruses, worms, bots, Trojan horses and spyware, have
become serious and critical threats that affect our lives significantly, great efforts have been …

Method and system for security maintenance in a network

BG Barnett, JE Hershey, D Thanos - US Patent 8,112,521, 2012 - Google Patents
A system and method for monitoring a network and detecting network vulnerabilities is
provided. A communication associated with one or more programs is issued to one or more …

Development of a secure traffic analysis system to trace malicious activities on internal networks

S Hirono, Y Yamaguchi, H Shimada… - 2014 IEEE 38th …, 2014 - ieeexplore.ieee.org
In contrast to conventional cyber attacks such as mass infection malware, targeted attacks
take a long time to complete their mission. By using a dedicated malware for evading …

FAP: Design of an Architecture of a Forensic Access Point to Perform Online Access in a Forensically Sound Manner

D Spiekermann - Proceedings of the 2020 European Interdisciplinary …, 2020 - dl.acm.org
The forensic investigation of data stored on mobile devices is a common option to analyze
and solve cyber-crime cases. The analysis of the installed applications extracts and collects …

[PDF][PDF] Protocol and method for preventing attacks from the web

R Uda - International Journal of Computer and Information …, 2011 - academia.edu
Nowadays, computer worms, viruses and Trojan horse become popular, and they are
collectively called malware. Those malware just spoiled computers by deleting or rewriting …

Malware Exposed: An In-Depth Analysis of its Behavior and Threats

C Anand, S Korada, S Raksha… - 2023 3rd …, 2023 - ieeexplore.ieee.org
Any software that acts maliciously towards a user, device, or network is referred to as
malware. Malware analysis consists of four fundamental processes that make use of a …

Malware Sandbox Analysis with Efficient Observation of Herder's Behavior

T Kasama, K Yoshioka, T Matsumoto… - Journal of information …, 2012 - jstage.jst.go.jp
Recent malware communicate with remote hosts in the Internet for receiving C&C
commands and updating themselves, etc., and their behaviors can be diverse depending on …

[PDF][PDF] A Study on Malware Detection and Disinfection Based on Dynamic Analysis

R Tanabe - 2017 - ynu.repo.nii.ac.jp
In recent years, continuous and persistent cyber-attack that targets specific person,
company, and organization are increasing (Targeted attack). The attacker has a particular …

A Study on Malware Analysis Leveraging Sandbox Evasive Behaviors

笠間貴弘 - 2014 - ynu.repo.nii.ac.jp
Internet security threats utilizing highly functional malicious programs called malware are
recently on the rise, and extensive research efforts have been made to counter them. With …