scholarly journals Eventpad: Rapid Malware Analysis and Reverse Engineering using Visual Analytics

Author(s):  
Bram C.M. Cappers ◽  
Paulus N. Meessen ◽  
Sandro Etalle ◽  
Jarke J. van Wijk
Author(s):  
Raditya Faisal Waliulu ◽  
Teguh Hidayat Iskandar Alam

At this paper focus on Malicous Software also known as Malware APT1 (Advance Persistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator successfull user to realized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected packet in network and analysis of malware behavior and dissambler body malware.Keyword : forensic malware, Analysis, Advance Presistent Threat, Cyberwar, dissambler


Author(s):  
Muath Alrammal ◽  
Munir Naveed ◽  
Suzan Sallam ◽  
Georgios Tsaramirsis

2012 ◽  
Vol 198-199 ◽  
pp. 343-350 ◽  
Author(s):  
Pei Dai Xie ◽  
Mei Jian Li ◽  
Yong Jun Wang ◽  
Jin Shu Su ◽  
Xi Cheng Lu

Nowadays most of malware samples are packed with runtime packers to complicate the task of reverse engineering and security analysis in order to evade detection of signature-based anti-virus engines. In the overall process of malware analysis, unpacking a packed malicious binary effectively is a necessary preliminary to extract the structure features from the binary for generation of its signature, and therefore several unpacking techniques have been proposed so far that attempt to deal with the packer problem. This brief survey article provides an overview of the currently published prevalent unpacking techniques and tools. It covers the operation process of packing and unpacking, packer detection methods, heuristic policies for spotting original entry point (OEP), environments for runtime unpacking, anti-unpacking techniques, and introduces several typical tools for unpacking.


2017 ◽  
Vol 1 (1) ◽  
pp. 35-40 ◽  
Author(s):  
Aaron Zimba ◽  
Luckson Simukonda ◽  
Mumbi Chishimba

Encryption has protected the Internet for some time now and it has come to raise user trust on the otherwise unsecure Internet. However, recent years have seen the use of robust encryption as stepping stone for cyber-criminal activities. Ransomware has not escaped the headlines even as it has attacked almost every sector of the society using a myriad of infection vectors. Mission critical data has been held to ransom and victims have had to part away with millions of dollars. The advent of the anonymous Bitcoin network has made matters worse where it’s been virtually infeasible to trace the perpetrators. In this paper, we endeavor to perform dynamic analysis of WannaCry ransomware samples based on malwarefree infection vectors. Further, we perform reverse-engineering to dissect the ransomware code for further analysis. Results show that despite the use of resilient encryption, the ransomware like other families in the wild uses the same attack structure and cryptographic primitives. Our analysis leads us to the conclusion that this ransomware strain isn't as complex as previously reported. This detailed practical analysis tries to raise awareness to the business community on the realities and importance of IT security whilst hinting on prevention, recovery and the limitations thereof.


Author(s):  
Patrick Ruediger ◽  
Felix Claus ◽  
Bernd Hamann ◽  
Hans Hagen ◽  
Heike Leitte

The authors introduce an integrative approach for the analysis of the high-dimensional parameter space relevant for decision-making in the context of quality control. Typically, a large number of parameters influence the quality of a manufactured part in an assembly process, and our approach supports the visual exploration and comprehension of the correlations among various parameters and their effects on part quality. We combine visualization and machine learning methods to help a user with the identification of important parameter value settings having certain effects on a part. The goal to understand the influence of parameter values on part quality is treated from a reverse engineering perspective, driven by the goal to determine what values cause what effects on part quality. The high-dimensional parameter value domain generally cannot be visualized directly, and the authors employ dimension reduction techniques to address this problem. Their prototype system makes possible the identification of regions in a high-dimensional parameter value space that lead to desirable (or non-desirable) parameter value settings for quality assurance. They demonstrate the validity and effectiveness of our methods and prototype by applying them to a sheet metal deformation example.


Author(s):  
Markus Wagner ◽  
Dominik Sacha ◽  
Alexander Rind ◽  
Fabian Fischer ◽  
Robert Luh ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document