CFP last date
20 January 2025
Reseach Article

Implementation of Malware Analysis using Static and Dynamic Analysis Method

by Syarif Yusirwan S, Yudi Prayudi, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 6
Year of Publication: 2015
Authors: Syarif Yusirwan S, Yudi Prayudi, Imam Riadi
10.5120/20557-2943

Syarif Yusirwan S, Yudi Prayudi, Imam Riadi . Implementation of Malware Analysis using Static and Dynamic Analysis Method. International Journal of Computer Applications. 117, 6 ( May 2015), 11-15. DOI=10.5120/20557-2943

@article{ 10.5120/20557-2943,
author = { Syarif Yusirwan S, Yudi Prayudi, Imam Riadi },
title = { Implementation of Malware Analysis using Static and Dynamic Analysis Method },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 6 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 11-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume117/number6/20557-2943/ },
doi = { 10.5120/20557-2943 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:58:35.374776+05:30
%A Syarif Yusirwan S
%A Yudi Prayudi
%A Imam Riadi
%T Implementation of Malware Analysis using Static and Dynamic Analysis Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 6
%P 11-15
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Malware analysis is a process to perform analysis of malware and how to study the components and behavior of malware. On this paper it will use two methods of malware analysis, static analysis and dynamic analysis. Static analysis is a method of malware analysis which done without running the malware. While dynamic analysis is a method of malware analysis which the malware is running in a secure system [7]. Malware analysis is important, since many malware at this day which is not detectable by antivirus. Now viruses are made with special ability to avoid detection from antivirus [9]. On this research we will focus on implementation of malware analysis using static analysis and dynamic analysis method.

References
  1. Distler, D. 2007. Malware Analysis: An Introduction. Jurnal of SANS Institute. December, 2007.
  2. Eilam, E. 2003. Reversing - Secrets of Reverse Engineering. Indianapolis: Wiley Publishing, Inc.
  3. Flores, R. 2012. Malware Reverse Engineering part1 of 2. Static analysis. Technical Report.
  4. Kaur, G. , & Nagpal, B. 2012. Malware Analysis & its Application to Digital Forensic. International Journal on Computer Science and Engineering (IJCSE), Vol. 4 No. 04 April 2012.
  5. Kendall, K. , 2007. Practical malware analysis. Technical Report. Mandiant, Intelligent Information Security.
  6. Palo Alto Network. Analysis of New and Evasive Malware in Live Enterprise Networks. Technical Report. 1st Edition, March 2013.
  7. Sikorski, Michael, Honig, A. 2012. Practical Malware Analysis. San Francisco: William Pollock.
  8. Uppal, D. , Mehra, V. , & Verma, V. 2014. Basic survey on Malware Analysis, Tools and Techniques. International Journal on Computational Sciences & Applications (IJCSA) Vol. 4, No. 1, February 2014.
  9. Vigna, G. 2014. Antivirus Isn't Dead, It Just Can't Keep Up. Technical Report. Lastline Labs, May 2014.
  10. Zahn, K. J. 2013. Case Study: 2012 DC3 Digital Forensic Challenge Basic Malware Analysis Exercise. Journal of SANS Institute, August, 2013.
  11. Wenhua, Luo; Tang Yanjun, L. N. 2012. Reverse Analysis of Malwares: A Case Study on QQ Passwords Collection. Journal of Software, Vol. 7, No. 8, August 2012.
  12. Daoud, E. Al, Jebril, I. H. , & Zaqaibeh, B. 2008. Computer Virus Strategies and Detection Methods. Int. J. Open Problems Compt. Math. , Vol. 1, No. 2, September 2008.
  13. Arasu Bharati, S. R. 2014. Detection of Packed and Polymorphic Malware Using Malwise. International Journal of Advance Research in Computer Science and Management Studies. Vol. 2, Issue 1, January 2014.
  14. Almarri, S. , & Sant, P. 2014. Optimised Malware Detection in Digital Forensics. International Journal of Network Security & Its Applications (IJNSA), Vol. 6, No. 1, January 2014.
  15. Malwaretips. com. 2014.
  16. Ari N, H. 2014, Penerapan Analisa Malware Pada Biscuit apt1 Menggunakan Teknik Reverse Engineering. Journal of KNSI, February 2015.
Index Terms

Computer Science
Information Sciences

Keywords

Malware Analysis Malware Analysis with Static and Dynamic Analysis Malware Analysis with Static Analysis Malware Analysis with Dynamic Analysis.