A proactive malicious software identification approach for digital forensic examiners

09/20/2021
by   Muhammad Ali, et al.
0

Digital investigators often get involved with cases, which seemingly point the responsibility to the person to which the computer belongs, but after a thorough examination malware is proven to be the cause, causing loss of precious time. Whilst Anti-Virus (AV) software can assist the investigator in identifying the presence of malware, with the increase in zero-day attacks and errors that exist in AV tools, this is something that cannot be relied upon. The aim of this paper is to investigate the behaviour of malware upon various Windows operating system versions in order to determine and correlate the relationship between malicious software and OS artifacts. This will enable an investigator to be more efficient in identifying the presence of new malware and provide a starting point for further investigation.

READ FULL TEXT
POST COMMENT

Comments

There are no comments yet.

Authors

page 4

page 6

page 7

page 8

page 9

page 10

page 25

page 27

05/06/2019

A Benchmark API Call Dataset for Windows PE Malware Classification

The use of operating system API calls is a promising task in the detecti...
10/14/2020

Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools

Following a series of high profile miscarriages of justice in the UK lin...
06/14/2019

Antiforensic techniques deployed by custom developed malware in evading anti-virus detection

Both malware and antivirus detection tools advance in their capabilities...
04/23/2019

PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware

PowerShell is nowadays a widely-used technology to administrate and mana...
09/19/2020

Optimizing Away JavaScript Obfuscation

JavaScript is a popular attack vector for releasing malicious payloads o...
04/04/2018

Developing a K-ary malware using Blockchain

Cyberattacks are nowadays moving rapidly. They are customized, multi-vec...
08/26/2020

SIGL: Securing Software Installations Through Deep Graph Learning

Many users implicitly assume that software can only be exploited after i...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.