Haittaohjelmat ja niiden analyysi
This master’s thesis is a study of malware and methods and tools used in their
analysis in a 32-bit Windows environment. The methods vary from simple observations to
deeper static and dynamic analysis in assembly language. In the practical we use these tools
and methods to dissect a real world malware sample.
Asiasanat
Metadata
Näytä kaikki kuvailutiedotKokoelmat
- Pro gradu -tutkielmat [29743]
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Exploring Shifting Patterns in Recent IoT Malware
Carrillo-Mondejar, Javier; Suarez-Tangil, Guillermo; Costin, Andrei; Rodríguez, Ricardo J. (Academic Conferences International Ltd, 2024)The rise of malware targeting interconnected infrastructures has surged in recent years, driven largely by the widespread presence of vulnerable legacy IoT devices and inadequately secured networks. Despite the strong ... -
Cloud platform comparison for malware development
Janowski, Kamil (2019)The cloud platforms such as AWS, Google Cloud or Azure are designed to cover most popular cases in terms of web development. They provide services that make it easy to create a new user based on his email address, provide ... -
Hypervisor-assisted dynamic malware analysis
Leon, Roee S.; Kiperberg, Michael; Zabag, Anat Anatey Leon; Zaidenberg, Nezer Jacob (Springer, 2021)Malware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static analysis ... -
Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats
Xin, Tong; Siponen, Mikko; Chen, Sihua (Taylor & Francis, 2022)According to coping theory, individuals cope with information system threats by adopting either problem-focused coping (PFC) or emotion-focused coping (EFC). However, little is known about EFC in the information security ... -
Support Vector Machine Integrated with game-theoretic approach and genetic algorithm for the detection and classification of malware
Zolotukhin, Mikhail; Hämäläinen, Timo (IEEE, 2013)Abstract. —In the modern world, a rapid growth of mali- cious software production has become one of the most signifi- cant threats to the network security. Unfortunately, wides pread signature-based anti-malware ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.