Evaluating Malware Forensics Tools

09/26/2022
by   Ian Kennedy, et al.
0

We present an example implementation of the previously published Malware Analysis Tool Evaluation Framework (MATEF) to explore if a systematic basis for trusted practice can be established for evaluating malware artefact detection tools used within a forensic investigation. The application of the framework is demonstrated through a case study which presents the design of two example experiments that consider the hypotheses: (1) Is there an optimal length of time in which to execution malware for analysis and (2) Is there any observable difference between tools when observing malware behaviour? The experiments used a sample of 4,800 files known to produce network artefacts. These were selected at random from a library of over 350,000 malware binaries. The tools Process Monitor and TCPVCon, popular in the digital forensic community, are chosen as the subjects for investigating these two questions. The results indicate that it is possible to use the MATEF to identify an optimal execution time for a software tool used to monitor activity generated by malware.

READ FULL TEXT

page 4

page 5

research
11/06/2022

MAIL: Malware Analysis Intermediate Language

This paper introduces and presents a new language named MAIL (Malware An...
research
10/14/2020

Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools

Following a series of high profile miscarriages of justice in the UK lin...
research
02/09/2018

Don't Repeat Yourself: Seamless Execution and Analysis of Extensive Network Experiments

This paper presents MACI, the first bespoke framework for the management...
research
01/06/2018

Using Malware Self-Defence Mechanism to Harden Defence and Remediation Tools

Malware are becoming a major problem to every individual and organizatio...
research
07/23/2021

Malware Analysis with Artificial Intelligence and a Particular Attention on Results Interpretability

Malware detection and analysis are active research subjects in cybersecu...
research
04/10/2018

Monotonic models for real-time dynamic malware detection

In dynamic malware analysis, programs are classified as malware or benig...
research
12/10/2017

Study of Peer-to-Peer Network Based Cybercrime Investigation: Application on Botnet Technologies

The scalable, low overhead attributes of Peer-to-Peer (P2P) Internet pro...

Please sign up or login with your details

Forgot password? Click here to reset