StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Dynamic Analysis of Malware - Research Paper Example

Cite this document
Summary
Malware is a generic term referring to kinds of unwanted softwares. Dynamic malware analysis comprises of methods that analyze large amounts of malware in a fast and reliable fashion. The main focus of researchers is on different types of dynamic malware analysis…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.4% of users find it useful
Dynamic Analysis of Malware
Read Text Preview

Extract of sample "Dynamic Analysis of Malware"

? Dynamic Analysis of Malware Dynamic Analysis of Malware Malware is a generic term referring to kinds of unwanted softwares. Dynamic malware analysis came about due to problems arising in reference to manual malware analysis. Dynamic malware analysis comprises of methods that analyze large amounts of malware in a fast and reliable fashion. The main focus of researchers is on different types of dynamic malware analysis (Hartmann, 2009). Dynamic Malware Analysis Techniques Dynamic analysis is the term used to describe the act of analyzing the actions performed by a program while being executed. There are different approaches and techniques applicable in performing dynamic analysis. Function Call Monitoring A function comprises of a code that executes a certain task like creating a file or calculating factorial value of a number. In the use of functions easy code re-usability, and easier maintenance can result. The property that makes functions interesting for program analysis is that they are usually used to abstract from execution particulars to a semantically richer representation. For example, so long as the outcome corresponds to the sorted input, the particular algorithm which a sort function implements might not be essential. When it comes to analyzing code, such abstractions help in gaining an overview of the behavior of the program when analyzing a code. By intercepting these calls, one can monitor what functions are called by a program. Hooking is the process of intercepting function calls. A hook function is invoked when the analyzed program is manipulated in addition to the anticipated function (Hunt, Thomas, & Cunningham, 1999). Application Programming Interface (API) This hook function is responsible for putting into action the necessary analysis functionality like analyzing its input parameters or recording its stats to a log file. Application Programming Interface (API) are groups of functions that form a logical set of functionality, like communicating over the network or file manipulation. In most cases, operating systems provide several APIs that can be used by applications to perform familiar tasks and can be found on diverse layers of abstraction. The term API on windows OS, refers to a set of APIs which give access to varying functional groupings like system services, networking, management and security (Leyden, 2001). System Calls System calls is usually categorized into two, and it is the software execution on computer systems which run commodity of the shelf OS. These two categories are user-mode and kernel-mode. User-mode is used in executing general applications like image manipulation programs or word processors. The only code that is executed in kernel-mode has direct entry to the system state. This partition prohibits the user-mode process from interacting with the system and its environment. For example, since it is impossible to create or directly open a file for a user-space process, the operating system (OS) provides a unique well defined API-the system call interface. A user-mode application is able to request the OS to perform a small set of tasks on its behalf, by using system calls. A user-mode application has to invoke the precise system-call showing the file’s path, name and access method in order to create a file. As soon as the system call is invoked, it is changed into kernel-mode. The OS carries out the task on behalf of the user-mode applications when there are enough access rights for the desired action upon verification (Nick, 2006). Anubis Anubis is a critical component/tool which is used for studying/analyzing Windows PE-executable’s behavior, main focus being on malware analysis. Anubis execution results in the making of report files that have enough information, thus enabling a user to have a clear idea about the use and actions of the analyzed binary. The report has detailed data regarding enhancements made to the Windows registry or file system. This analysis relays on running and watching the binary in an emulated environment. The analysis’ main focus is on security aspects of a program's actions, making the analysis process less cumbersome, and allowing for more accurate end results since the domain is extra fine-grained. It can generally be said that Anubis is a service for analyzing malware. A person can decide whether to manually analyze a sample in depth or otherwise. Some of the benefits of dynamic code analysis with Anubis are: ANUBIS is capable in handling basic user interactions if necessary during analysis. ANUBIS has scalable approach which is not affected by runtime packers, anti-debug mechanisms or code obfuscation of modern malware. Anubis has advanced features, where it records and analyses samples network traffic and storage of analysis reports in relation to DB, like files created, modified and deleted. It incorporates many report formats such as XML, HTML, MHT, PDF and TXT. It integrates static analysis with AV scanner/PE scan URL analysis In its architecture and capabilities, Anubis has got 5 main building blocks which include: XML which enables the generation of numerous statistics Malware storage Archives which uploads and analyzes samples Report storage Archives report/result Victim server for certain services, keeping malicious traffic local! Multiple Worker (VM) Snapshot technology which can revert to the known state in seconds Anubis was designed to assist human experts to give fast overview of a sample’s behavior. Anubis is used in data tainting, which a powerful technique used in tracing data flows of a program like how network data is processed by a program, and also makes us able to find out if for infection, a malware uses random file names during a single analysis run. Anubis can also provide the feature known as “clustering”. This feature is used in finding and partitioning a given set of malware samples into subsets, so that subsets share some common traits. Features in malware clustering are behavior based, which require prior Anubis analysis, which uses LSH (Locality Sensitive Hashing), which enables avoidance of computing all n2/2 distances, suitable for clustering real-world malware collections. In conclusion, Anubis offers technology to hasten malware analysis due to automatic processing of samples saving time; it improves the traditional analysis procedure flow because of its features. The feature of clustering is only unique to Anubis, and it can also offer added functionality for “in the cloud” services, which are used in academic research projects. Anubis has two versions, the public version which is not premium based and offers limited features with no customization, and the commercial version which is available on request and offers more features. Anubis is the ideal tool for the virus and malware fascinated individual to get a fast knowledge of the objective of an unknown binary (Rooney, 2011). References Hartmann, A. K. (2009). Practical Guide to Computer Simulations. Singapore: World Scientific. Hunt, A., Thomas, D., and Cunningham, W. (1999). The Pragmatic Programmer. From Journeyman to Master. Amsterdam: Addison-Wesley Longman. Leyden, J. (2001). Highly destructive Linux worm mutating. Retrieved from http://www.theregister.co.uk/2001/03/28/highly_destructive_linux_worm_mutating Nick, F. (2006). Linux worm targets PHP flaw. Retrieved from http://www.theregister.co.uk/2006/02/20/linux_worm/ Rooney, B. (2011). Malware Is Posing Increasing Danger. Retrieved from http://online.wsj.com/article/SB10001424052748704904604576332812592346714.html Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Dynamic Analysis of Malware Research Paper Example | Topics and Well Written Essays - 1000 words”, n.d.)
Dynamic Analysis of Malware Research Paper Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1460458-dynamic-analysis-of-malware
(Dynamic Analysis of Malware Research Paper Example | Topics and Well Written Essays - 1000 Words)
Dynamic Analysis of Malware Research Paper Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1460458-dynamic-analysis-of-malware.
“Dynamic Analysis of Malware Research Paper Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1460458-dynamic-analysis-of-malware.
  • Cited: 0 times

CHECK THESE SAMPLES OF Dynamic Analysis of Malware

General Sandbox Architecture

One of these methods is to perform a behavioral analysis of a suspected malware by letting it execute in a determined environment i.... The behavioral analysis of a malware that is conducted inside the constrained environment of sandbox is expected to reveal the information regarding the internal mechanisms, working and communication infrastructure of suspected code.... This way the system can be brought back into the safe state after complete behavioral analysis of the suspected program....
4 Pages (1000 words) Research Paper

A Knowledge of Groupwork Theory

Group-dynamic games are experiential education exercises which aid people in learning about themselves, develop and enrich interpersonal relationships, and assess how groups function from a group dynamics or social psychological point of view.... Group-dynamic games are specifically designed for the purpose of furthering personal development, character building, and teamwork via a Group-dynamic milieu.... he use of group dynamic activities have been used for years in conflict resolution, anger management and team building and many other areas such as drug rehabilitation and drama therapy....
11 Pages (2750 words) Essay

Investigating Dynamic Malware Analysis Tool

Even simple obfuscation such as code re-ordering and inserting no-ops can create a variant of malware able to evade signature-based detectors.... In addition, the signature database grows exponentially since the detector uses a specific signature for every variant of malware.... malware has evolved into a more lethal threat by use of multiple vectors to launch attacks and exploit both unknown and known computer vulnerabilities and can infest prescanned files and folders with lightning speed....
4 Pages (1000 words) Research Proposal

Investigating Dynamic Malware Analysis Tool

Popular examples of malware programs includes 'Ransomware Trojans', 'Keyloggers', 'Rootkit virus' and multiple more.... The paper "Investigating Dynamic malware Analysis Tool" describes certain possible ways through which such malicious programs can be terminated.... hellip; malware is a type of malicious software, which has been major software through which intruders steal crucial information out of organizations.... The continuous evolutionary patterns of the malware designs have raised difficult for the analysts in terms of identifying and terminating such programs from slipping into systems in an undetected manner....
27 Pages (6750 words) Case Study

Hospital Environmental Analysis

Because of the dynamic nature of these forces and their changing influence on the hospital's environment on a… This is because the administrator must not only be aware of the organization's internal environment, but also of those changes occurring in the external environment.... The political environment is dynamic and constantly changing....
6 Pages (1500 words) Assignment

Open System Model of Management, What Is SWOT Analysis

nbsp;… In general, it is quite important to state that the management should also make an analysis of the ground level situations besides that of the SWOT.... From the paper "Open System Model of Management, What Is SWOT analysis" it is clear that the limitations of the SWOT analysis can be decreased by developing an overarching vision that incorporates both the tangible and intangible strengths, weaknesses, opportunities and threats....
8 Pages (2000 words) Assignment

Changing Definitions of Entrepreneurship

As the dynamic characteristics link together with these qualities, there is a link to the growth of an organization.... nbsp; When looking at the concepts of various theorists, it can be seen that there are changing definitions and specific perspectives that are taken, all which are based on the idea of building a deeper meaning of what it means to be an entrepreneur as well as how this relates to the various aspects of working smarter with a field which continues to grow and which is based on dynamic components of the individuals who are continuing to work as leaders in the business society....
13 Pages (3250 words) Research Paper

Techniques for Dynamic Analysis for Understanding the Operation of Executables

This paper “Techniques for dynamic analysis for Understanding the Operation of Executables” presented a relatively detailed review of the techniques of dynamic analysis that can be employed to various systems of known functionality.... hellip; Understanding the operation of executables is abridged when a blend of techniques for dynamic analysis is employed.... Effective dynamic analysis necessitates that the execution traces be produced by executing states that are representative of the typical usage of the system....
6 Pages (1500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us