Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Dynamic malware analysis in the modern era--a state of the art survey
Or-Meir O., Nissim N., Elovici Y., Rokach L. ACM Computing Surveys52 (5):1-48,2019.Type:Article
Date Reviewed: May 14 2020

Malware is a problem. Its spreading within industrial networks and critical infrastructures shows that there is an always increasing need for cybersecurity expertise to detect, protect, and react to infections. Unfortunately, analyzing how malware attacks a network can be an extremely complex task for a small team of cybersecurity specialists. Attackers can be highly motivated and can potentially have unlimited resources (in the worst cases).

Typically, malware is either statically or dynamically analyzed. However, malware writers can use “various techniques ... to evade static analysis” and “dynamic analysis tools ... are imperfect.” As the article states: “there is no single tool that cover[s] all aspects of malware behavior.”

In this survey, the authors provide a taxonomy for the malware, for the behavior of the malware, for how the malware analysis can be done, and for the techniques and tools available to perform it. The article concludes with a matrix summarizing malware behavior and correlations with layout and techniques. Such classifications can tremendously help malware analysts choose the best analysis strategy.

Chief information security officers (CISOs), security information and event management (SIEM), and security operations center (SOC) practitioners will benefit from reading this article, as it provides insight into the techniques of both malware authors and malware analysts.

Reviewer:  Massimiliano Masi Review #: CR146968 (2008-0191)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security and Protection (D.4.6 )
 
 
Protection Mechanisms (D.2.0 ... )
 
 
General (D.0 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Practical UNIX security
Garfinkel S., Spafford G., O’Reilly & Associates, Inc., Sebastopol, CA, 1991. Type: Book (9780937175729)
Jun 1 1992
Trusted products evaluation
Chokhani S. Communications of the ACM 35(7): 64-76, 1992. Type: Article
Oct 1 1993
An experience using two covert channel analysis techniques on a real system design
Haigh J., Kemmerer R., McHugh J., Young W. IEEE Transactions on Software Engineering SE-13(2): 157-168, 1987. Type: Article
Nov 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy