Malware Analysis

Ujaliben Kalpesh Bavishi, Bhavesh Madanlal Jain


Malware, also known as malicious software affects the user’s computer system or mobile devices by exploiting the system’s vulnerabilities. It is a major threat to the security of the computer systems. Some of the types of malwares that are most commonly used are viruses, trojans, worms, etc. Nowadays, there is a widespread use of malware which allows malware author to get sensitive information like bank details, contact information which is a serious threat in the world. Most of the malwares are spread through internet because of its frequent use which can destroy large systems piercing through network. Hence, in this paper, we focus on analyzing malware using different tools which can analyze the malware in a restricted environment. Since many malware authors uses self-modifying code and obfuscation, it is very difficult for the traditional antivirus software to detect the malware which identifies that it is under scan and it can change its execution sequence.  So, in order to address the shortcomings of the traditional antivirus software, we will be discussing some of the analysis tools which runs analysis on the malware in an effective manner and helps us to analyze the malware which can help us to protect our system’s information.

Full Text:



U. Bayer, C. Kruegel, and E. Kirda. TTAnalyze: A Tool for Analyzing Malware. In 15th Annual Conference of the European Institute for Computer Antivirus Research (EICAR), 2006.

Andreas Moser, Christopher Kruegel, and Engin Kirda. Exploring Multiple Execution Paths for Malware Analysis. In Technical University Vienna for Secure System lab, 2007.

Philipp Trinius, Thorsten holz, Jan Gobel, Felix C. Freiling. Visual Analysis of Malware Behaviour Using Treemaps and Thread Graphs. In Laboratory for Dependables Distributed Systems, University of Mannheim, Germany, 2009.

Shih-Yao Dai, Fyodor Y, Jain-Shing Wu, Chih-Hung Lin, Yennun Huang, Sy-yen Kuo. Holography: A Hardware Virtualization Tool For Malware Analysis. In 15th IEEE Racific Rim International Symposium on Dependable Computing, 2009.



  • There are currently no refbacks.

© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.