2019
DOI: 10.1145/3329786
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Malware Analysis in the Modern Era—A State of the Art Survey

Abstract: ORI OR-MEIR, NIR NISSIM, YUVAL ELOVICI, and LIOR ROKACH, Ben-Gurion University of the Negev, Beer-Sheva, IsraelAlthough malicious software (malware) has been around since the early days of computers, the sophistication and innovation of malware has increased over the years. In particular, the latest crop of ransomware has drawn attention to the dangers of malicious software, which can cause harm to private users as well as corporations, public services (hospitals and transportation systems), governments, and s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
96
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 233 publications
(128 citation statements)
references
References 72 publications
0
96
0
1
Order By: Relevance
“…Whilst seemingly trivial, these evasion techniques are increasingly used to determine whether the environment is a genuine target (i.e., a real system with a real user). Common evasion techniques may include system artefact checks, including the use of registry edits and virtual environment processes ( [2,4,[19][20][21][22][23][24][25][26]), trigger-based behaviour ( [4,19,20,[26][27][28]) and checks for human interaction ( [4,19,20,26,[29][30][31]).…”
Section: Evasion and Anti-evasion Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Whilst seemingly trivial, these evasion techniques are increasingly used to determine whether the environment is a genuine target (i.e., a real system with a real user). Common evasion techniques may include system artefact checks, including the use of registry edits and virtual environment processes ( [2,4,[19][20][21][22][23][24][25][26]), trigger-based behaviour ( [4,19,20,[26][27][28]) and checks for human interaction ( [4,19,20,26,[29][30][31]).…”
Section: Evasion and Anti-evasion Methodsmentioning
confidence: 99%
“…Malware analysis aims to study the traits and characteristics of malicious software, so that those tasked with defending computer systems can better understand the nature of an intended malicious attack and defend against future attacks. Common techniques include static analysis that examines software source code and dynamic analysis that observes system behaviours when the malware executes [1,2]. Moser et al discussed the limits to adopting static analysis methods [3] such as code obfuscation techniques and it has long been recognised that dynamic analysis allows for greater understanding of how malware behaves in a given environment.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…There are various spyware and trojans that can either eavesdrop and modify users' messages, both on smartphones like Android [10], such as Trojan-Spy.SymbOS.Flexispy [11] and others; and on computers, like sniffers [12]. Such malware, running on promiscuous mode, commonly sniffs every packet received and sent by all Network Interface Cards (NICs) of the infected device, being able to read their payloads if they are transmitted in clear text.…”
Section: Problem Statementmentioning
confidence: 99%
“…The aim is to look for changes in the infected machine where it is running, network traffic and potential external communications with command and control servers. It can be done manually in a virtual or physical environment using different tools that collect the data of its interaction with the machine infected or automatically by "Sandbox" toolset [17].…”
Section: Introductionmentioning
confidence: 99%