Systematic Approach to Malware Analysis (SAMA)
| dc.contributor.author | Bermejo-Higuera, Javier | |
| dc.contributor.author | Abad-Aramburu, Carlos | |
| dc.contributor.author | Bermejo Higuera, Juan Ramón | |
| dc.contributor.author | Sicilia Urban, Miguel Ángel | |
| dc.contributor.author | Sicilia, Juan Antonio | |
| dc.date | 2020-02 | |
| dc.date.accessioned | 2020-08-04T10:46:40Z | |
| dc.date.available | 2020-08-04T10:46:40Z | |
| dc.description.abstract | Malware threats pose new challenges to analytic and reverse engineering tasks. It is needed for a systematic approach to that analysis, in an attempt to fully uncover their underlying attack vectors and techniques and find commonalities between them. In this paper, a method of malware analysis is described, together with a report of its application to the case of Flame and Red October. The method has also been used bv different analysts to analyze other malware threats like 'Stuxnet', 'Dark Comet', Toison Ivy', 'Locky', 'Careto', and 'Sofacy Carberp'. The method presented in this work is a systematic and methodological process of analysis, whose main objective is the acquisition of knowledge as well as to gain a full understanding of a particular malware. Using the proposed method to analyze two well-known malware as 'Flame' and 'Red October' will help to understand the added value of the method. | es_ES |
| dc.identifier.citation | Bermejo Higuera, J.; Abad Aramburu, C.; Bermejo Higuera, J.-R.; Sicilia Urban, M.A.; Sicilia Montalvo, J.A. Systematic Approach to Malware Analysis (SAMA). Appl. Sci. 2020, 10, 1360. | es_ES |
| dc.identifier.doi | https://doi.org/10.3390/app10041360 | |
| dc.identifier.issn | 2076-3417 | |
| dc.identifier.uri | https://reunir.unir.net/handle/123456789/10321 | |
| dc.language.iso | eng | es_ES |
| dc.publisher | Applied Sciences | es_ES |
| dc.relation.ispartofseries | ;vol. 10, nº 4 | |
| dc.relation.uri | https://www.mdpi.com/2076-3417/10/4/1360 | es_ES |
| dc.rights | openAccess | es_ES |
| dc.subject | malware analysis | es_ES |
| dc.subject | malware sample | es_ES |
| dc.subject | Flame | es_ES |
| dc.subject | Red October | es_ES |
| dc.subject | sandbox | es_ES |
| dc.subject | behavioral analysis | es_ES |
| dc.subject | code analysis | es_ES |
| dc.subject | Scopus | es_ES |
| dc.subject | JCR | es_ES |
| dc.title | Systematic Approach to Malware Analysis (SAMA) | es_ES |
| dc.type | Articulo Revista Indexada | es_ES |
| opencost.publication.doi | https://doi.org/10.3390/app10041360 | |
| reunir.tag | ~ARI | es_ES |
Archivos
Bloque de licencias
1 - 1 de 1
Cargando...
- Nombre:
- license.txt
- Tamaño:
- 1.27 KB
- Formato:
- Item-specific license agreed upon to submission
- Descripción:


