scholarly journals Comparative Review of Malware Analysis Methodologies

2021 ◽  
Vol 13 (6) ◽  
pp. 105-122
Author(s):  
Ioannis G. Kiachidis ◽  
Dimitrios A. Baltatzis

To fight against the evolution of malware and its development, the specific methodologies that are applied by the malware analysts are crucial. Yet, this is something often overlooked in the relevant bibliography or in the formal and informal training of the relevant professionals. There are only two generic and allencompassing structured methodologies for Malware Analysis (MA) – SAMA and MARE. The question is whether they are adequate and there is no need for another one or whether there is no such need at all. This paper will try to answer the above and it will contribute in the following ways: it will present, compare and dissect those two malware analysis methodologies, it will present their capacity for analysing modern malware by applying them on a random modern specimen and finally, it will conclude on whether there is a procedural optimization for malware analysis over the evolution of these two methodologies.

1989 ◽  
Vol 34 (9) ◽  
pp. 836-838
Author(s):  
Virginia Greendlinger
Keyword(s):  

1998 ◽  
Vol 11 (01) ◽  
pp. 08-18 ◽  
Author(s):  
C. W. McIlwraith ◽  
J. A. Auer ◽  
Brigitte von Rechenberg

SummaryCases of cystic bone lesions in horses and humans were reviewed in the literature. These lesions are radiolucent areas of bone, recognized as subchondral cystic lesions in the horse (SCL), intra-osseous ganglia (IOG), subchondral bone cysts secondary to osteoarthrosis (OAC), and unicameral bone cysts (UCB) in humans. Their morphology is quite similar, consisting of lesions with a distinct cyst wall, and a cavity filled with fibrous tissue and yellowish mucoid fluid. The lesions are surrounded by sclerotic bone and can be easily diagnosed radiographically. SCL, IOG and OAC occur in the subchondral bone close to the adjacent joint, whereas UCB occur in the metaphysis of long bones. Their aetiology and pathogenesis is still unknown, although primary damage to the subchondral bone, cartilage or local blood supply and growth disturbances are discussed. In this review 703 lesions of SCL in horses, 289 lesions of IOG and 1460 lesions of UCB in humans were compared in their anatomical location and clinical signs. SCL and OAC resembled each other with respect to anatomical location. A correlation of affected bones could not be found for all four groups. Clinical presentation concerning age was most similar for SCL and UCB with both lesions mainly occurring in young individuals. Gender predominance of males was present in SCL, IOG and UCB. Clinical diagnosis was either incidental, or connected with intermittent pain in all lesions except for OAC. Additionally, the lesions were also found in conjunction with degenerative joint disease (SCL, OAC) or pathological fractures (UCB). Cystic bone lesions were either treated conservatively, surgically with curettage alone, curettage in combination with grafting procedures, or intra-lesional application of corticosteroids. SCL and UCB were similar in their biological behaviour concerning their slow response to the therapy and relatively high recurrence rate. None of the cystic bone lesions were comparable, and a common aetiology and pathogenesis could not be found.In a literature review cases of cystic bone lesions in horses and humans were compared with the goal to find a common aetiology and pathogenesis. Cystic bone lesions occur in horses as subchondral cystic lesions (SCL), and in humans as either intra-osseous ganglia (IOG), subchondral cystic lesions secondary to osteoarthrosis (OAC) or unicameral bone cysts (UCB). IOG and OAC compare with SCL mainly in the anatomical location. IOG and SCL resemble each other in size, clinical signs and histology, whereas UCB and SCL show a similar biological behaviour regarding their therapeutic response and recurrence rate. None of the cystic bone lesions in humans were comparable to the SCL in horses in all aspects. A common aetiology and pathogenesis could not be established.


Moreana ◽  
2019 ◽  
Vol 56 (Number 211) (1) ◽  
pp. 97-120
Author(s):  
Concepción Cabrillana

This article addresses Thomas More's use of an especially complex Latin predicate, fio, as a means of examining the degree of classicism in this aspect of his writing. To this end, the main lexical-semantic and syntactic features of the verb in Classical Latin are presented, and a comparative review is made of More's use of the predicate—and also its use in texts contemporaneous to More, as well as in Late and Medieval Latin—in both prose and poetry. The analysis shows that he works within a general framework of classicism, although he introduces some of his own idiosyncrasies, these essentially relating to the meaning of the verb that he employs in a preferential way and to the variety of verbal forms that occur in his poetic text.


2012 ◽  
Vol 2 (6) ◽  
pp. 101-104
Author(s):  
Leenu Singh Leenu Singh ◽  
◽  
Syed Imtiyaz Hassan
Keyword(s):  

Author(s):  
Raditya Faisal Waliulu ◽  
Teguh Hidayat Iskandar Alam

At this paper focus on Malicous Software also known as Malware APT1 (Advance Persistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator successfull user to realized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected packet in network and analysis of malware behavior and dissambler body malware.Keyword : forensic malware, Analysis, Advance Presistent Threat, Cyberwar, dissambler


Sign in / Sign up

Export Citation Format

Share Document