2017
DOI: 10.1016/j.diin.2017.02.005
|View full text |Cite
|
Sign up to set email alerts
|

Scanning memory with Yara

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(7 citation statements)
references
References 6 publications
1
6
0
Order By: Relevance
“…In a paper on the malware analysis tool Yara, Cohen [9] describes LotL as a trend that has been recently observed in the tactics used by elite threat actors; this claim is reinforced by the results of our analysis. Research by Hassan et al [21] states that APT malware uses LotL attack strategies to enable persistent campaigns and analyses two campaigns, compared to our less granular analysis of 16,232 samples.…”
Section: Related Worksupporting
confidence: 66%
See 1 more Smart Citation
“…In a paper on the malware analysis tool Yara, Cohen [9] describes LotL as a trend that has been recently observed in the tactics used by elite threat actors; this claim is reinforced by the results of our analysis. Research by Hassan et al [21] states that APT malware uses LotL attack strategies to enable persistent campaigns and analyses two campaigns, compared to our less granular analysis of 16,232 samples.…”
Section: Related Worksupporting
confidence: 66%
“…Yara Rule Match Malware. We collected an additional dataset by leveraging the live hunting service from VT. To this end, we deployed three Yara [9] rules we wrote to detect the use of LotL binaries based on the behavioural footprint of the samples. We make these rules public in our repository.…”
Section: A Dataset Compositionmentioning
confidence: 99%
“…When evaluating memory with scanning techniques, one can either scan the virtual address space or the memory image directly. Cohen [45] proposed a "context aware" scanning method that uses the Windows Page Frame Number (PFN) database to rapidly identify the owner of each physical page, and where it is mapped in its virtual address space. This method improves the matching speed and accuracy since the virtual address space need not be reconstructed for every process.…”
Section: Signature Scanningmentioning
confidence: 99%
“…The indicators of cybercrime can be searched from the extensive data set of evidence like malicious network traffic (Pilli et al, 2010;Tobergte & Curtis, 2013). The finding may be shared with the development team of security tools for improvement purposes (Case & Richard III, 2017;Cohen, 2017;Burdach, 2006).…”
Section: Examinationmentioning
confidence: 99%