恶意软件取证分析技术和工具综述

Shahad Al-Sofyani, Amerah Alelayani, Fatimah Al-zahrani, Roaa Monshi
{"title":"恶意软件取证分析技术和工具综述","authors":"Shahad Al-Sofyani, Amerah Alelayani, Fatimah Al-zahrani, Roaa Monshi","doi":"10.1109/ICAISC56366.2023.10085474","DOIUrl":null,"url":null,"abstract":"With technological progress, the risk factor resulting from malware is increasing dramatically. In this paper, we present the most prominent techniques and tools used in malware forensics to combat this threat. The malware designed by attackers is multiform and has the potential to spread and harm the global economy and corporate assets every day. Thus, there is an urgent need to analyze and detect malware before important assets worldwide are damaged. In this study, we discuss various techniques for malware analysis, such as static, dynamic, hybrid, and memory forensic, as well as malware-detection techniques, such as signature, anomaly, and specification. Moreover, we present the most prominent tools used to analyze and detect malware. These tools are divided into two categories: static and dynamic. The paper focus in studying the main features and limitations of the current malware forensic techniques and tools.","PeriodicalId":422888,"journal":{"name":"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Survey off Malware Forensics Analysis Techniques And Tools\",\"authors\":\"Shahad Al-Sofyani, Amerah Alelayani, Fatimah Al-zahrani, Roaa Monshi\",\"doi\":\"10.1109/ICAISC56366.2023.10085474\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With technological progress, the risk factor resulting from malware is increasing dramatically. In this paper, we present the most prominent techniques and tools used in malware forensics to combat this threat. The malware designed by attackers is multiform and has the potential to spread and harm the global economy and corporate assets every day. Thus, there is an urgent need to analyze and detect malware before important assets worldwide are damaged. In this study, we discuss various techniques for malware analysis, such as static, dynamic, hybrid, and memory forensic, as well as malware-detection techniques, such as signature, anomaly, and specification. Moreover, we present the most prominent tools used to analyze and detect malware. These tools are divided into two categories: static and dynamic. The paper focus in studying the main features and limitations of the current malware forensic techniques and tools.\",\"PeriodicalId\":422888,\"journal\":{\"name\":\"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAISC56366.2023.10085474\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAISC56366.2023.10085474","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

随着技术的进步,恶意软件带来的风险因素急剧增加。在本文中,我们介绍了在恶意软件取证中使用的最突出的技术和工具来对抗这种威胁。攻击者设计的恶意软件形式多样,每天都有可能传播和损害全球经济和企业资产。因此,迫切需要在全球重要资产遭到破坏之前对恶意软件进行分析和检测。在本研究中,我们讨论了各种恶意软件分析技术,如静态、动态、混合和内存取证,以及恶意软件检测技术,如签名、异常和规范。此外,我们还介绍了用于分析和检测恶意软件的最突出的工具。这些工具分为两类:静态和动态。本文重点研究了当前恶意软件取证技术和工具的主要特点和局限性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Survey off Malware Forensics Analysis Techniques And Tools
With technological progress, the risk factor resulting from malware is increasing dramatically. In this paper, we present the most prominent techniques and tools used in malware forensics to combat this threat. The malware designed by attackers is multiform and has the potential to spread and harm the global economy and corporate assets every day. Thus, there is an urgent need to analyze and detect malware before important assets worldwide are damaged. In this study, we discuss various techniques for malware analysis, such as static, dynamic, hybrid, and memory forensic, as well as malware-detection techniques, such as signature, anomaly, and specification. Moreover, we present the most prominent tools used to analyze and detect malware. These tools are divided into two categories: static and dynamic. The paper focus in studying the main features and limitations of the current malware forensic techniques and tools.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信