| Peer-Reviewed

A Malware Analysis Using Static and Dynamic Techniques

Received: 6 July 2015     Accepted: 8 July 2015     Published: 7 August 2015
Views:       Downloads:
Abstract

In this survey work we analyze “win 32 malware gen” it’s genre, procedure, harm using static and dynamic techniques. Static and dynamic methods were used to analyze a software program for any threats to the system. Static analysis involves testing its own source code and analyzing the threat itself, dynamic analysis involves specific secure, keeping threats within a system and analyzing the working progress of threats within the system

Published in American Journal of Networks and Communications (Volume 5, Issue 1-1)

This article belongs to the Special Issue Traffic and Performance Engineering for Networks

DOI 10.11648/j.sjbm.s.2016050101.15
Page(s) 20-22
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2015. Published by Science Publishing Group

Keywords

Malware, Threat - Data Fail Safe

References
[1] www.symantec.com/connect/articles/malware-analysis-administrators.
[2] Chris Gates, “Hacker Defender Rootkit for the Masses”, 2007.
[3] “Malware challenge” , jerome.segura@gmail.com.
[4] Dean De Beer, “Malware Analysis Challenge III”, 2007.
[5] Bill Arnold, David Chess, John Moral, “An Environment for Controlled Worm Replication and Analysis”, 2008.
[6] Alla Segal, “Reverse-Engineering Malware”, 2006.
[7] http://en.wikipedia.org/wiki/Windows_Registry
[8] http://kb.chemtable.com/ru/windows-registry-main-keys.htm#hkcu
[9] https://technet.microsoft.com/en-us/library/bb896645.aspx
[10] “Wireshark FAQ”, Retrieved 31 December 2011.
[11] https://technet.microsoft.com/en-us/sysinternals/bb896653.aspx
[12] “Practical Malware Analysis” The Hands-On Guide to Dissecting Malicious Software.
Cite This Article
  • APA Style

    Bymbadorj Dondogmegd, Usukhbayr B., Nyamjav J. (2015). A Malware Analysis Using Static and Dynamic Techniques. American Journal of Networks and Communications, 5(1-1), 20-22. https://doi.org/10.11648/j.sjbm.s.2016050101.15

    Copy | Download

    ACS Style

    Bymbadorj Dondogmegd; Usukhbayr B.; Nyamjav J. A Malware Analysis Using Static and Dynamic Techniques. Am. J. Netw. Commun. 2015, 5(1-1), 20-22. doi: 10.11648/j.sjbm.s.2016050101.15

    Copy | Download

    AMA Style

    Bymbadorj Dondogmegd, Usukhbayr B., Nyamjav J. A Malware Analysis Using Static and Dynamic Techniques. Am J Netw Commun. 2015;5(1-1):20-22. doi: 10.11648/j.sjbm.s.2016050101.15

    Copy | Download

  • @article{10.11648/j.sjbm.s.2016050101.15,
      author = {Bymbadorj Dondogmegd and Usukhbayr B. and Nyamjav J.},
      title = {A Malware Analysis Using Static and Dynamic Techniques},
      journal = {American Journal of Networks and Communications},
      volume = {5},
      number = {1-1},
      pages = {20-22},
      doi = {10.11648/j.sjbm.s.2016050101.15},
      url = {https://doi.org/10.11648/j.sjbm.s.2016050101.15},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.sjbm.s.2016050101.15},
      abstract = {In this survey work we analyze “win 32 malware gen” it’s genre, procedure, harm using static and dynamic techniques. Static and dynamic methods were used to analyze a software program for any threats to the system. Static analysis involves testing its own source code and analyzing the threat itself, dynamic analysis involves specific secure, keeping threats within a system and analyzing the working progress of threats within the system},
     year = {2015}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - A Malware Analysis Using Static and Dynamic Techniques
    AU  - Bymbadorj Dondogmegd
    AU  - Usukhbayr B.
    AU  - Nyamjav J.
    Y1  - 2015/08/07
    PY  - 2015
    N1  - https://doi.org/10.11648/j.sjbm.s.2016050101.15
    DO  - 10.11648/j.sjbm.s.2016050101.15
    T2  - American Journal of Networks and Communications
    JF  - American Journal of Networks and Communications
    JO  - American Journal of Networks and Communications
    SP  - 20
    EP  - 22
    PB  - Science Publishing Group
    SN  - 2326-8964
    UR  - https://doi.org/10.11648/j.sjbm.s.2016050101.15
    AB  - In this survey work we analyze “win 32 malware gen” it’s genre, procedure, harm using static and dynamic techniques. Static and dynamic methods were used to analyze a software program for any threats to the system. Static analysis involves testing its own source code and analyzing the threat itself, dynamic analysis involves specific secure, keeping threats within a system and analyzing the working progress of threats within the system
    VL  - 5
    IS  - 1-1
    ER  - 

    Copy | Download

Author Information
  • Department of Electrical Engineering, Ulaanbaatar State University, Ulaanbaatar, Mongolia

  • Department of Electrical Engineering, Ulaanbaatar State University, Ulaanbaatar, Mongolia

  • Department of Electrical Engineering, Ulaanbaatar State University, Ulaanbaatar, Mongolia

  • Sections