Malware Analysis & its Application to Digital Forensic
نویسندگان
چکیده
In this paper we present study about how to analyze the malware on the system for digital investigation and also give the superficial knowledge and comparison about forensic model. This paper proposes a plan for achieving a dramatic improvement in research and operational efficiency through the adoption of systematic approaches for representing forensic data and performing forensic computation. This paper describes the nature of Forensic Science. Here we introduce malware analysis tools. Furthermore we also described malware analysis for digital forensic investigation. Keywords-: Malware Analysis, Computer Forensics, Digital Forensic, Cyber Forensics
منابع مشابه
Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes
Digital forensic investigators commonly use dynamic malware analysis methods to analyze a suspect executable found during a post-mortem analysis of the victim’s computer. Unfortunately, currently proposed dynamic malware analysis methods and sandbox solutions have a number of limitations that may lead the investigators to ambiguous conclusions. In this research, the limitations of the use of cu...
متن کاملDigital Forensic Analysis on Runtime Instruction Flow
Computer system’s runtime information is an essential part of the digital evidence. Current digital forensic approaches mainly focus on memory and I/O data, while the runtime instructions from processes are often ignored. We present a novel approach on runtime instruction forensic analysis and have developed a forensic system which collects instruction flow and extracts digital evidence. The sy...
متن کاملOptimised Malware Detection in Digital Forensics
On the Internet, malware is one of the most serious threats to system security. Most complex issues and problems on any systems are caused by malware and spam. Networks and systems can be accessed and compromised by malware known as botnets, which compromise other systems through a coordinated attack. Such malware uses anti-forensic techniques to avoid detection and investigation. To prevent sy...
متن کاملAnalyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications
The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...
متن کاملInvestigating and Analyzing Malicious Events in Android Application
Smart mobile devices have been widely used and the contained sensitive information is endangered by malware events and codes. The malicious events caused by malwares are crucial evidences for digital forensic analysis, and the main task of mobile forensic analysis is to find the malicious codes and reconstruct these events. However, the reconstruction heavily relies on the code analysis of the ...
متن کامل