December 2013
Intermediate to advanced
616 pages
14h 38m
English
• Goals
• Guidelines for Examining a Malicious File Specimen
• Establishing the Environment Baseline
• Pre-execution Preparation: System and Network Monitoring
• Execution Artifact Capture: Digital Impression and Trace Evidence
• Executing the Malicious Code Specimen
• Execution Trajectory Analysis: Observing Network, Process, System Calls, and File System Activity
• Automated Malware Analysis Frameworks
• Embedded Artifact Extraction Revisited
• Interacting with and Manipulating the Malware Specimen: Exploring and Verifying Specimen Functionality and Purpose
• Event Reconstruction and Artifact Review: Post-run Data Analysis
• Digital Virology: Advanced Profiling through Malware ...