مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

1,031
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

AN OPTIMAL AND TRANSPARENT FRAMEWORK FOR AUTOMATIC ANALYSIS OF MALWARE

Pages

  71-80

Abstract

 Malware is the most important security threat in cyberspace. Some statistics show that over 315, 000 MALWARE are released, every day. Certainly, it is not possible to analyze all of these MALWARE, manually. That's why the security vendors are obliged to use software capable of analyzing suspicious executable files. These software determine behavior of suspicious files automatically. Several tools such as Anubis and Cuckoo are produced in this area. The problem of these tools is lack of TRANSPARENCY. Some MALWARE use this sort of weaknesses to recon ANALYSIS ENVIRONMENTs. To resolve this problem some solutions using HARDWARE-ASSISTED VIRTUALIZATION is presented.However, these solutions impose a great run time overhead on the program execution. In this paper an automated MALWARE analysis framework is presented that is both transparent and optimal. This framework in addition to being resistant to MALWARE with split personality features, may also be used to analyze the large amount of MALWARE released every day without adding extra hardware resources. This framework uses DYNAMIC ANALYSIS approaches with hardware assisted virtualization technology to analyze suspicious code. The DYNAMIC ANALYSIS approaches used in this framework include sandboxing and system calls sequence analysis. Analysis based on hardwareassisted virtualization technology is applied to provide transparent ANALYSIS ENVIRONMENT.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    PARSA, SAEED, & GOORAN OORIMI, A.. (2016). AN OPTIMAL AND TRANSPARENT FRAMEWORK FOR AUTOMATIC ANALYSIS OF MALWARE. (JOURNAL OF ADVANCED DEFENCE SCIENCE AND TECHNOLOGY) JOURNAL OF PASSIVE DEFENCE SCIENCE AND TECHNOLOGY, 7(1), 71-80. SID. https://sid.ir/paper/167412/en

    Vancouver: Copy

    PARSA SAEED, GOORAN OORIMI A.. AN OPTIMAL AND TRANSPARENT FRAMEWORK FOR AUTOMATIC ANALYSIS OF MALWARE. (JOURNAL OF ADVANCED DEFENCE SCIENCE AND TECHNOLOGY) JOURNAL OF PASSIVE DEFENCE SCIENCE AND TECHNOLOGY[Internet]. 2016;7(1):71-80. Available from: https://sid.ir/paper/167412/en

    IEEE: Copy

    SAEED PARSA, and A. GOORAN OORIMI, “AN OPTIMAL AND TRANSPARENT FRAMEWORK FOR AUTOMATIC ANALYSIS OF MALWARE,” (JOURNAL OF ADVANCED DEFENCE SCIENCE AND TECHNOLOGY) JOURNAL OF PASSIVE DEFENCE SCIENCE AND TECHNOLOGY, vol. 7, no. 1, pp. 71–80, 2016, [Online]. Available: https://sid.ir/paper/167412/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button