Toward Automated Forensic Analysis of Obfuscated Malware

dc.contributor.advisorWang, Xinyuan
dc.contributor.authorFarley, Ryan Joseph
dc.creatorFarley, Ryan Joseph
dc.date.accessioned2015-07-29T18:42:49Z
dc.date.available2015-07-29T18:42:49Z
dc.date.issued2015
dc.description.abstractMalware analysis, forensics, and reverse engineering reveal a deeper understanding of the inner workings of malware and the mechanics behind attack detection, which enables us to develop better defenses against increasingly sophisticated malware. Despite its inherent value, the current state of forensic analysis requires notable manual effort due to various obfuscation techniques used by malware. In this work, we investigate how to automate forensic analysis of obfuscated malware and develop novel tools that can automatically pinpoint and recover hidden, obfuscated malicious code within memory dumps and network traffic captures. Our tool also helps to identify the vulnerable data structure within the exploited binary executable.
dc.format.extent160 pages
dc.identifier.urihttps://hdl.handle.net/1920/9697
dc.language.isoen
dc.rightsCopyright 2015 Ryan Joseph Farley
dc.subjectComputer science
dc.subjectComputer engineering
dc.subjectCode Extraction
dc.subjectData-flow Analysis
dc.subjectDynamic Analysis
dc.subjectMalware Forensics
dc.subjectObfuscated Shellcode
dc.subjectSelective Symbolic Execution
dc.titleToward Automated Forensic Analysis of Obfuscated Malware
dc.typeDissertation
thesis.degree.disciplineComputer Science
thesis.degree.grantorGeorge Mason University
thesis.degree.levelDoctoral

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Farley_gmu_0883E_10831.pdf
Size:
4.26 MB
Format:
Adobe Portable Document Format