• Mi Re-Unir
    Búsqueda Avanzada
    JavaScript is disabled for your browser. Some features of this site may not work without it.
    Ver ítem 
    •   Inicio
    • RESULTADOS DE INVESTIGACIÓN
    • Artículos Científicos WOS y SCOPUS
    • Ver ítem
    •   Inicio
    • RESULTADOS DE INVESTIGACIÓN
    • Artículos Científicos WOS y SCOPUS
    • Ver ítem

    Systematic Approach to Malware Analysis (SAMA)

    Autor: 
    Bermejo-Higuera, Javier
    ;
    Abad-Aramburu, Carlos
    ;
    Bermejo Higuera, Juan Ramón
    ;
    Sicilia Urban, Miguel Ángel
    ;
    Sicilia, Juan Antonio
    Fecha: 
    02/2020
    Palabra clave: 
    malware analysis; malware sample; Flame; Red October; sandbox; behavioral analysis; code analysis; Scopus; JCR
    Revista / editorial: 
    Applied Sciences
    Citación: 
    Bermejo Higuera, J.; Abad Aramburu, C.; Bermejo Higuera, J.-R.; Sicilia Urban, M.A.; Sicilia Montalvo, J.A. Systematic Approach to Malware Analysis (SAMA). Appl. Sci. 2020, 10, 1360.
    Tipo de Ítem: 
    Articulo Revista Indexada
    URI: 
    https://reunir.unir.net/handle/123456789/10321
    DOI: 
    https://doi.org/10.3390/app10041360
    Dirección web: 
    https://www.mdpi.com/2076-3417/10/4/1360
    Open Access
    Resumen:
    Malware threats pose new challenges to analytic and reverse engineering tasks. It is needed for a systematic approach to that analysis, in an attempt to fully uncover their underlying attack vectors and techniques and find commonalities between them. In this paper, a method of malware analysis is described, together with a report of its application to the case of Flame and Red October. The method has also been used bv different analysts to analyze other malware threats like 'Stuxnet', 'Dark Comet', Toison Ivy', 'Locky', 'Careto', and 'Sofacy Carberp'. The method presented in this work is a systematic and methodological process of analysis, whose main objective is the acquisition of knowledge as well as to gain a full understanding of a particular malware. Using the proposed method to analyze two well-known malware as 'Flame' and 'Red October' will help to understand the added value of the method.
    Mostrar el registro completo del ítem
    Este ítem aparece en la(s) siguiente(s) colección(es)
    • Artículos Científicos WOS y SCOPUS

    Estadísticas de uso

    Año
    2012
    2013
    2014
    2015
    2016
    2017
    2018
    2019
    2020
    2021
    2022
    2023
    2024
    2025
    Vistas
    0
    0
    0
    0
    0
    0
    0
    0
    55
    123
    141
    118
    169
    62
    Descargas
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0

    Ítems relacionados

    Mostrando ítems relacionados por Título, autor o materia.

    • A systematic approach to analysis for assessing the security level of cyber-physical systems in the electricity sector 

      Sánchez Rodríguez, Miguel Ángel ; Bermejo-Higuera, Javier ; Bermejo Higuera, Juan Ramón ; Sicilia, Juan Antonio ; González-Crespo, Rubén (Elsevier B.V., 2021)
      In a context of digitalization and technological evolution in all aspects of our lives, the electricity sector could not be left behind. This opens up a new range of possibilities until now unthinkable, which will facilitate ...
    • On Attacking Kerberos Authentication Protocol in Windows Active Directory Services: A Practical Survey 

      Díaz Motero, Carlos ; Bermejo Higuera, Juan Ramón ; Bermejo-Higuera, Javier ; Sicilia, Juan Antonio ; Gámez, Nádia (Institute of Electrical and Electronics Engineers Inc., 2021)
      Organizations use Active Directory Windows service to authenticate users in a network with the extended Kerberos Authentication protocol. Therefore, it is necessary to investigate its resistance to the different types of ...
    • MMALE a methodology for malware analysis in linux environments 

      de Vicente Mohino, José Javier ; Bermejo-Higuera, Javier; Bermejo Higuera, Juan Ramón; Sicilia, Juan Antonio ; Sánchez Rubio, Manuel ; Martínez Herraiz, José-Javier (Computers, materials and continua, 2021)
      In a computer environment, an operating systemis prone to malware, and even the Linux operating system is not an exception. In recent years, malware has evolved, and attackers have becomemore qualified compared to a fewyears ...

    Mi cuenta

    AccederRegistrar

    ¿necesitas ayuda?

    Manual de UsuarioContacto: reunir@unir.net

    Listar

    todo Re-UnirComunidades y coleccionesPor fecha de publicaciónAutoresTítulosPalabras claveTipo documentoTipo de accesoEsta colecciónPor fecha de publicaciónAutoresTítulosPalabras claveTipo documentoTipo de acceso






    Aviso Legal Política de Privacidad Política de Cookies Cláusulas legales RGPD
    © UNIR - Universidad Internacional de La Rioja
     
    Aviso Legal Política de Privacidad Política de Cookies Cláusulas legales RGPD
    © UNIR - Universidad Internacional de La Rioja