{"title":"恶意软件检测的内存分析:使用OSCAR方法的综合调查","authors":"Yasin Dehfouli, Arash Habibi Lashkari","doi":"10.1145/3764580","DOIUrl":null,"url":null,"abstract":"The steady growth of malware over the years has now sharply escalated, with a 30% surge in global cyberattacks in 2024. This rise demands advanced detection, as traditional methods often miss sophisticated or fileless malware. Memory analysis detects traces left by any malware in volatile memory, revealing runtime behaviors, privilege escalation attempts, and active processes. An examination of prior research shows that existing surveys on memory analysis have significant gaps, as none provide a comprehensive overview of the field. To address these gaps, this survey systematically proposes key research questions and addresses them using the OSCAR (Obtain, Strategize, Collect, Analyze, Report) methodology. Memory acquisition techniques and tools have been discussed with the most diverse taxonomy provided to the best of our knowledge. Furthermore, forensic methods, tools, and studies are categorized into four distinct approaches, with a comprehensive taxonomy at the end. We also evaluated and ranked memory dump datasets using our proposed scoring system. Finally, the survey covers malware detection methods, examining both machine learning and traditional approaches and their accuracy, benefits, drawbacks, and challenges. This survey aims to provide a comprehensive and up-to-date overview of the field of memory analysis, with a focus on detecting malicious activities.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"29 1","pages":""},"PeriodicalIF":28.0000,"publicationDate":"2025-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Memory Analysis for Malware Detection: A Comprehensive Survey Using the OSCAR Methodology\",\"authors\":\"Yasin Dehfouli, Arash Habibi Lashkari\",\"doi\":\"10.1145/3764580\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The steady growth of malware over the years has now sharply escalated, with a 30% surge in global cyberattacks in 2024. This rise demands advanced detection, as traditional methods often miss sophisticated or fileless malware. Memory analysis detects traces left by any malware in volatile memory, revealing runtime behaviors, privilege escalation attempts, and active processes. An examination of prior research shows that existing surveys on memory analysis have significant gaps, as none provide a comprehensive overview of the field. To address these gaps, this survey systematically proposes key research questions and addresses them using the OSCAR (Obtain, Strategize, Collect, Analyze, Report) methodology. Memory acquisition techniques and tools have been discussed with the most diverse taxonomy provided to the best of our knowledge. Furthermore, forensic methods, tools, and studies are categorized into four distinct approaches, with a comprehensive taxonomy at the end. We also evaluated and ranked memory dump datasets using our proposed scoring system. Finally, the survey covers malware detection methods, examining both machine learning and traditional approaches and their accuracy, benefits, drawbacks, and challenges. This survey aims to provide a comprehensive and up-to-date overview of the field of memory analysis, with a focus on detecting malicious activities.\",\"PeriodicalId\":50926,\"journal\":{\"name\":\"ACM Computing Surveys\",\"volume\":\"29 1\",\"pages\":\"\"},\"PeriodicalIF\":28.0000,\"publicationDate\":\"2025-08-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACM Computing Surveys\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1145/3764580\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Computing Surveys","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1145/3764580","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
Memory Analysis for Malware Detection: A Comprehensive Survey Using the OSCAR Methodology
The steady growth of malware over the years has now sharply escalated, with a 30% surge in global cyberattacks in 2024. This rise demands advanced detection, as traditional methods often miss sophisticated or fileless malware. Memory analysis detects traces left by any malware in volatile memory, revealing runtime behaviors, privilege escalation attempts, and active processes. An examination of prior research shows that existing surveys on memory analysis have significant gaps, as none provide a comprehensive overview of the field. To address these gaps, this survey systematically proposes key research questions and addresses them using the OSCAR (Obtain, Strategize, Collect, Analyze, Report) methodology. Memory acquisition techniques and tools have been discussed with the most diverse taxonomy provided to the best of our knowledge. Furthermore, forensic methods, tools, and studies are categorized into four distinct approaches, with a comprehensive taxonomy at the end. We also evaluated and ranked memory dump datasets using our proposed scoring system. Finally, the survey covers malware detection methods, examining both machine learning and traditional approaches and their accuracy, benefits, drawbacks, and challenges. This survey aims to provide a comprehensive and up-to-date overview of the field of memory analysis, with a focus on detecting malicious activities.
期刊介绍:
ACM Computing Surveys is an academic journal that focuses on publishing surveys and tutorials on various areas of computing research and practice. The journal aims to provide comprehensive and easily understandable articles that guide readers through the literature and help them understand topics outside their specialties. In terms of impact, CSUR has a high reputation with a 2022 Impact Factor of 16.6. It is ranked 3rd out of 111 journals in the field of Computer Science Theory & Methods.
ACM Computing Surveys is indexed and abstracted in various services, including AI2 Semantic Scholar, Baidu, Clarivate/ISI: JCR, CNKI, DeepDyve, DTU, EBSCO: EDS/HOST, and IET Inspec, among others.