Mason Archival Repository Service

Toward Automated Forensic Analysis of Obfuscated Malware

Show simple item record

dc.contributor.advisor Wang, Xinyuan
dc.contributor.author Farley, Ryan Joseph
dc.creator Farley, Ryan Joseph
dc.date.accessioned 2015-07-29T18:42:49Z
dc.date.available 2015-07-29T18:42:49Z
dc.date.issued 2015
dc.identifier.uri https://hdl.handle.net/1920/9697
dc.description.abstract Malware analysis, forensics, and reverse engineering reveal a deeper understanding of the inner workings of malware and the mechanics behind attack detection, which enables us to develop better defenses against increasingly sophisticated malware. Despite its inherent value, the current state of forensic analysis requires notable manual effort due to various obfuscation techniques used by malware. In this work, we investigate how to automate forensic analysis of obfuscated malware and develop novel tools that can automatically pinpoint and recover hidden, obfuscated malicious code within memory dumps and network traffic captures. Our tool also helps to identify the vulnerable data structure within the exploited binary executable.
dc.format.extent 160 pages
dc.language.iso en
dc.rights Copyright 2015 Ryan Joseph Farley
dc.subject Computer science en_US
dc.subject Computer engineering en_US
dc.subject Code Extraction en_US
dc.subject Data-flow Analysis en_US
dc.subject Dynamic Analysis en_US
dc.subject Malware Forensics en_US
dc.subject Obfuscated Shellcode en_US
dc.subject Selective Symbolic Execution en_US
dc.title Toward Automated Forensic Analysis of Obfuscated Malware
dc.type Dissertation en
thesis.degree.level Doctoral en
thesis.degree.discipline Computer Science en
thesis.degree.grantor George Mason University en


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search MARS


Browse

My Account

Statistics