Systematic Approach to Malware Analysis (SAMA)
Autor:
Bermejo-Higuera, Javier
; Abad-Aramburu, Carlos
; Bermejo Higuera, Juan Ramón
; Sicilia Urban, Miguel Ángel
; Sicilia, Juan Antonio
Fecha:
02/2020Palabra clave:
Tipo de Ítem:
Articulo Revista IndexadaDirección web:
https://www.mdpi.com/2076-3417/10/4/1360
Resumen:
Malware threats pose new challenges to analytic and reverse engineering tasks. It is needed for a systematic approach to that analysis, in an attempt to fully uncover their underlying attack vectors and techniques and find commonalities between them. In this paper, a method of malware analysis is described, together with a report of its application to the case of Flame and Red October. The method has also been used bv different analysts to analyze other malware threats like 'Stuxnet', 'Dark Comet', Toison Ivy', 'Locky', 'Careto', and 'Sofacy Carberp'. The method presented in this work is a systematic and methodological process of analysis, whose main objective is the acquisition of knowledge as well as to gain a full understanding of a particular malware. Using the proposed method to analyze two well-known malware as 'Flame' and 'Red October' will help to understand the added value of the method.
Este ítem aparece en la(s) siguiente(s) colección(es)
Estadísticas de uso
Año |
2012 |
2013 |
2014 |
2015 |
2016 |
2017 |
2018 |
2019 |
2020 |
2021 |
2022 |
Vistas |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
55 |
123 |
67 |
Descargas |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
Ítems relacionados
Mostrando ítems relacionados por Título, autor o materia.
-
On Attacking Kerberos Authentication Protocol in Windows Active Directory Services: A Practical Survey
Díaz Motero, Carlos (1); Bermejo Higuera, Juan Ramón (1); Bermejo-Higuera, Javier (1); Sicilia, Juan Antonio (1); Gámez, Nádia (1) (Institute of Electrical and Electronics Engineers Inc., 2021)Organizations use Active Directory Windows service to authenticate users in a network with the extended Kerberos Authentication protocol. Therefore, it is necessary to investigate its resistance to the different types of ... -
MMALE a methodology for malware analysis in linux environments
de Vicente Mohino, José Javier (1); Bermejo-Higuera, Javier; Bermejo Higuera, Juan Ramón; Sicilia, Juan Antonio (1); Sánchez Rubio, Manuel (1); Martínez Herraiz, José-Javier (Computers, materials and continua, 2021)In a computer environment, an operating systemis prone to malware, and even the Linux operating system is not an exception. In recent years, malware has evolved, and attackers have becomemore qualified compared to a fewyears ... -
Benchmarking Approach to Compare Web Applications Static Analysis Tools Detecting OWASP Top Ten Security Vulnerabilities
Bermejo Higuera, Juan Ramón (1); Bermejo-Higuera, Javier (1); Sicilia, Juan Antonio (1); Cubo Villalba, Javier (1); Nombela Pérez, Juan José (1) (CMC-Computers Materials & Continua, 2020)To detect security vulnerabilities in a web application, the security analyst must choose the best performance Security Analysis Static Tool (SAST) in terms of discovering the greatest number of security vulnerabilities ...