A proactive malicious software identification approach for digital forensic examiners

09/20/2021
by   Muhammad Ali, et al.
0

Digital investigators often get involved with cases, which seemingly point the responsibility to the person to which the computer belongs, but after a thorough examination malware is proven to be the cause, causing loss of precious time. Whilst Anti-Virus (AV) software can assist the investigator in identifying the presence of malware, with the increase in zero-day attacks and errors that exist in AV tools, this is something that cannot be relied upon. The aim of this paper is to investigate the behaviour of malware upon various Windows operating system versions in order to determine and correlate the relationship between malicious software and OS artifacts. This will enable an investigator to be more efficient in identifying the presence of new malware and provide a starting point for further investigation.

READ FULL TEXT

page 4

page 6

page 7

page 8

page 9

page 10

page 25

page 27

research
07/04/2023

Review of Deep Learning-based Malware Detection for Android and Windows System

Differentiating malware is important to determine their behaviors and le...
research
05/06/2019

A Benchmark API Call Dataset for Windows PE Malware Classification

The use of operating system API calls is a promising task in the detecti...
research
06/14/2019

Antiforensic techniques deployed by custom developed malware in evading anti-virus detection

Both malware and antivirus detection tools advance in their capabilities...
research
10/14/2020

Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools

Following a series of high profile miscarriages of justice in the UK lin...
research
04/15/2023

Preventing Malicious Use of Keyloggers Using Anti-Keyloggers

Multinational corporations routinely track how its employees use their c...
research
04/23/2019

PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware

PowerShell is nowadays a widely-used technology to administrate and mana...
research
04/04/2018

Developing a K-ary malware using Blockchain

Cyberattacks are nowadays moving rapidly. They are customized, multi-vec...

Please sign up or login with your details

Forgot password? Click here to reset