Vis enkel innførsel

dc.contributor.advisorGligoroski, Danilonb_NO
dc.contributor.advisorLøkken, Erik Alexandernb_NO
dc.contributor.authorEriksson, Thomasnb_NO
dc.date.accessioned2014-12-19T14:11:59Z
dc.date.available2014-12-19T14:11:59Z
dc.date.created2010-09-02nb_NO
dc.date.issued2009nb_NO
dc.identifier347116nb_NO
dc.identifierntnudaim:4624nb_NO
dc.identifier.urihttp://hdl.handle.net/11250/261632
dc.description.abstractThis thesis describes different automated dynamic malware analysis solutions and their underlying technologies. A good deal of prerequisite concepts has to be covered before the actual solutions are studied. Some of these concepts are virtualization, sandboxing, hooking and the Windows Operating System. It is important for us to understand how malware analysis works before we start to review the different automated solutions. For us to understand how malware analysis is done on a Windows system the Windows architecture has to be studied. The most important parts of the Windows architecture are covered in Chapter 2. Another concept we will stumble upon when dealing with malware analysis is virtualization. Virtualization is often used in the context of automated solutions since it is easy to revert back to saved states of the system. A typical approach is to have a clean state where the system is new; infecting this state with malware will not matter since we can revert back to the clean state at any moment. Closely related to virtualization is sandboxing. Sandboxing utilizes virtualization technology to build a secure environment where malicious code can be executed. When executing the malicious code we have to use some sort of technology to monitor its behavior. When talking about such technology we enter the darker side of malware analysis and find a concept called hooking. Hooking is the number one technique used to monitor the behavior of malware when run live in a virtual environment. It is also used by malicious coders to create rootkits and other nasty malware. After the most important prerequisite topics we will start to look at actual automated solutions that analyze malware dynamically. These solutions will be studied to the degree we can find documentation about them; no reverse engineering will be done. A lot of the tested solutions are commercial but there are also some open source projects out there. After an introduction to these solutions a couple of tests will be conducted. Two live malware samples which utilize new malicious technology will be tested to see if these solutions hold up. At the end of this thesis the automated solutions will be evaluated on the grounds of our test findings and their different underlying technology. We will also discuss how to best utilize one or more of these solutions as well as ideas for possible further work.nb_NO
dc.languageengnb_NO
dc.publisherInstitutt for telematikknb_NO
dc.subjectntnudaimno_NO
dc.subjectSIE7 kommunikasjonsteknologino_NO
dc.subjectTelematikkno_NO
dc.titleMalware Analysis; Frameworks and Tools for Automated Dynamic Analysis of Malwarenb_NO
dc.typeMaster thesisnb_NO
dc.source.pagenumber139nb_NO
dc.contributor.departmentNorges teknisk-naturvitenskapelige universitet, Fakultet for informasjonsteknologi, matematikk og elektroteknikk, Institutt for telematikknb_NO


Tilhørende fil(er)

Thumbnail
Thumbnail
Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel