Pregled bibliografske jedinice broj: 1241577
Static-Analysis Techniques of Malware Reverse Engineering
Static-Analysis Techniques of Malware Reverse Engineering // Annals of DAAAM for ... & proceedings of the ... International DAAAM Symposium ..., 33 (2022), 0172-0179 doi:10.2507/33rd.daaam.proceedings.024 (međunarodna recenzija, članak, znanstveni)
CROSBI ID: 1241577 Za ispravke kontaktirajte CROSBI podršku putem web obrasca
Naslov
Static-Analysis Techniques of Malware Reverse
Engineering
Autori
Morić, Zlatan ; Branstett, Loïc ; Petrunić, Robert
Izvornik
Annals of DAAAM for ... & proceedings of the ... International DAAAM Symposium ... (1726-9679) 33
(2022);
0172-0179
Vrsta, podvrsta i kategorija rada
Radovi u časopisima, članak, znanstveni
Ključne riječi
static analysis ; malware ; reverse engineering ; artificial intelligence ; dynamic analysis
Sažetak
Network and system security are critical issues of overall Internet security. Scientific papers and popular literature are full of new security issues being published and analysed daily. Due to the rapid proliferation of various types of malware tools that can be used both to create security attacks and to influence their results, traditional analysis methods struggle with the size and scope of samples needed to do proper analysis. For example, a well-disguised malware attack can easily penetrate an environment which is protected by a load balancer and/or Web Application Filter (WAF). In this paper, we will discuss different static-analysis techniques used to reverse engineer executable code to determine if the code is in fact malware.
Izvorni jezik
Engleski
Znanstvena područja
Računarstvo, Informacijske i komunikacijske znanosti
POVEZANOST RADA
Ustanove:
Visoko učilište Algebra, Zagreb