Static Malware Analysis : A Case Study

Authors(4) :-Satya Narayan Tripathy, Sisira Kumar Kapat, M. Soujanya, Susanta Kumar Das

In the arena of digitized era, everyone needs internet connectivity for seeking and sharing of information. Starting from sharing information to social networking, each task requires internet. Some of the malware take advantage of this, and use user activities to activate. Hence the vector will be SDN (Software Defined Network) and SNS (Social Networking Sites). In both the cases, the user cannot be pretended to be a malware specialist or a computer professional who can detect the malicious activity easily. Although a lot of anti-malware tools are available, but it is good if the user can predict the malware. This paper focuses to analyze a malware easily and effectively, which a normal user can capture.

Authors and Affiliations

Satya Narayan Tripathy
Department of Computer Science Berhampur University, Odisha, India
Sisira Kumar Kapat
Department of Computer Science Berhampur University, Odisha, India
M. Soujanya
Department of Computer Science Berhampur University, Odisha, India
Susanta Kumar Das
Department of Computer Science Berhampur University, Odisha, India

Malware, Static Analysis, Case Study, Portable Executable, Common Strings.

  1. A.H.Sung, J. Xu, P.Chavez, S.Mukkamala, "Static Analyzer of Vicious Executables (SAVE)", Conference Paper, DOI: 10.1109/CSAC.2004.37, Source: IEEE Xplore, https://www.researchgate.net/publication/4115464 , 2005
  2. Madhu K. Shankarapani, SubbuRamamoorthy, Ram S. Movva, SrinivasMukkamala, "Malware Detection using assembly and API call sequences", J ComputVirol (2011) 7:107-119, DOI 10.1007/s11416-010-0141-5, 2010
  3. KarishmaPandey, MadhuraNaik, JunaidQamar , MahendraPatil.," Spyware Detection Using Data Mining", International Journal for Research in Applied Science &Engineering,Technology(IJRASET) Volume 3 Issue III, March 2015
  4. Ankur Singh Bist, "Spyware Detection Techniques", INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Bist, 3(2): February, 2014
  5. Gerardo Canfora, Antonio NiccolòIannaccone, Corrado Aaron Visaggio, "Static analysis for the detection of metamorphic computer virusesusing repeated-instructions counting heuristics", J ComputVirol Hack Tech, DOI 10.1007/s11416-013-0189-0, 2013
  6. Andreas Moser, Christopher Kruegel, EnginKirda, "Limits of Static Analysis for Malware Detection", 23rd Annual Computer security applications conference, 2007, http://rosaec.snu.ac.kr/meet/file/20090204paperc.pdf
  7. Maryann Gong, Uma Girkar, Benjamin Xie, "Classifying Windows Malware with Static Analysis", https://courses.csail.mit.edu/6.857/2016/files/5.pdf
  8. Norkhushaini Awang, Arifin Salleh, Mohamad Yusof Darus, "Manual Malware Analysis Using Static Method", International Journal of Computer Networks and Communications Security, 1(7), ISSN 2308-9830, pp. 324-328, 2013
  9. Simon Kramer, Julian C.Bradfield, "A general definition of malware", DOI 10.1007/s11416-009-0137-1, J Comput Virol (2010) 6:105–114
  10. B. Jaya Prasad, Haritha Annangi, Krishna Sastry Pendyala, "Basic Static Malware Analysis using open source tools", https://securitycommunity.tcs.com/infosecsoapbox/sites/default/files/Static%20Malware%20Analysis%20Techniques%20.pdf
  11. Mohd. Ishrat, Manish Saxena, Dr. Mohd. Alamgir, "Comparison of Static and Dynamic Analysis for Runtime Monitoring", International Journal of Computer Science & Communication Networks, ISSN:2249-5789, Vol 2(5), 615-617
  12. Ronghua Tian, "An Integrated Malware Detection and Classification System", Ph.D. Thesis, Deakin University, 2011

Publication Details

Published in : Volume 2 | Issue 7 | September 2017
Date of Publication : 2017-09-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 135-141
Manuscript Number : CSEIT174418
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Satya Narayan Tripathy, Sisira Kumar Kapat, M. Soujanya, Susanta Kumar Das, "Static Malware Analysis : A Case Study", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 7, pp.135-141, September-2017.
Journal URL : http://ijsrcseit.com/CSEIT174418

Article Preview

Follow Us

Contact Us