2019
DOI: 10.2139/ssrn.3358798
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Advanced Volatile Threats Using Memory Forensics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…This technique is especially useful for the analysis of threats known as "fileless malware" or "memory-based attacks". In the article published by Gadgil & Nagpure [24] they give an insight into how certain types of malware do not install files on the target's hard drive to execute malicious activities. Malware lives directly in memory and can take advantage of system tools to inject code into trusted and safe processes such as javaw.exe or iexplorer.exe.…”
Section: Xxxxmentioning
confidence: 99%
“…This technique is especially useful for the analysis of threats known as "fileless malware" or "memory-based attacks". In the article published by Gadgil & Nagpure [24] they give an insight into how certain types of malware do not install files on the target's hard drive to execute malicious activities. Malware lives directly in memory and can take advantage of system tools to inject code into trusted and safe processes such as javaw.exe or iexplorer.exe.…”
Section: Xxxxmentioning
confidence: 99%