In this survey work we analyze “win 32 malware gen” it’s genre, procedure, harm using static and dynamic techniques. Static and dynamic methods were used to analyze a software program for any threats to the system. Static analysis involves testing its own source code and analyzing the threat itself, dynamic analysis involves specific secure, keeping threats within a system and analyzing the working progress of threats within the system
Published in |
American Journal of Networks and Communications (Volume 5, Issue 1-1)
This article belongs to the Special Issue Traffic and Performance Engineering for Networks |
DOI | 10.11648/j.sjbm.s.2016050101.15 |
Page(s) | 20-22 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2015. Published by Science Publishing Group |
Malware, Threat - Data Fail Safe
[1] | www.symantec.com/connect/articles/malware-analysis-administrators. |
[2] | Chris Gates, “Hacker Defender Rootkit for the Masses”, 2007. |
[3] | “Malware challenge” , jerome.segura@gmail.com. |
[4] | Dean De Beer, “Malware Analysis Challenge III”, 2007. |
[5] | Bill Arnold, David Chess, John Moral, “An Environment for Controlled Worm Replication and Analysis”, 2008. |
[6] | Alla Segal, “Reverse-Engineering Malware”, 2006. |
[7] | http://en.wikipedia.org/wiki/Windows_Registry |
[8] | http://kb.chemtable.com/ru/windows-registry-main-keys.htm#hkcu |
[9] | https://technet.microsoft.com/en-us/library/bb896645.aspx |
[10] | “Wireshark FAQ”, Retrieved 31 December 2011. |
[11] | https://technet.microsoft.com/en-us/sysinternals/bb896653.aspx |
[12] | “Practical Malware Analysis” The Hands-On Guide to Dissecting Malicious Software. |
APA Style
Bymbadorj Dondogmegd, Usukhbayr B., Nyamjav J. (2015). A Malware Analysis Using Static and Dynamic Techniques. American Journal of Networks and Communications, 5(1-1), 20-22. https://doi.org/10.11648/j.sjbm.s.2016050101.15
ACS Style
Bymbadorj Dondogmegd; Usukhbayr B.; Nyamjav J. A Malware Analysis Using Static and Dynamic Techniques. Am. J. Netw. Commun. 2015, 5(1-1), 20-22. doi: 10.11648/j.sjbm.s.2016050101.15
@article{10.11648/j.sjbm.s.2016050101.15, author = {Bymbadorj Dondogmegd and Usukhbayr B. and Nyamjav J.}, title = {A Malware Analysis Using Static and Dynamic Techniques}, journal = {American Journal of Networks and Communications}, volume = {5}, number = {1-1}, pages = {20-22}, doi = {10.11648/j.sjbm.s.2016050101.15}, url = {https://doi.org/10.11648/j.sjbm.s.2016050101.15}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.sjbm.s.2016050101.15}, abstract = {In this survey work we analyze “win 32 malware gen” it’s genre, procedure, harm using static and dynamic techniques. Static and dynamic methods were used to analyze a software program for any threats to the system. Static analysis involves testing its own source code and analyzing the threat itself, dynamic analysis involves specific secure, keeping threats within a system and analyzing the working progress of threats within the system}, year = {2015} }
TY - JOUR T1 - A Malware Analysis Using Static and Dynamic Techniques AU - Bymbadorj Dondogmegd AU - Usukhbayr B. AU - Nyamjav J. Y1 - 2015/08/07 PY - 2015 N1 - https://doi.org/10.11648/j.sjbm.s.2016050101.15 DO - 10.11648/j.sjbm.s.2016050101.15 T2 - American Journal of Networks and Communications JF - American Journal of Networks and Communications JO - American Journal of Networks and Communications SP - 20 EP - 22 PB - Science Publishing Group SN - 2326-8964 UR - https://doi.org/10.11648/j.sjbm.s.2016050101.15 AB - In this survey work we analyze “win 32 malware gen” it’s genre, procedure, harm using static and dynamic techniques. Static and dynamic methods were used to analyze a software program for any threats to the system. Static analysis involves testing its own source code and analyzing the threat itself, dynamic analysis involves specific secure, keeping threats within a system and analyzing the working progress of threats within the system VL - 5 IS - 1-1 ER -