• Correlate the information gathered through the interception of system calls with artifacts discovered in file system activity.

• Correlate file system activity with process activity and digital trace evidence such as dropped executables, libraries, hidden files, and anomalous text or binary files.

ent Monitor common locations where malware manifests to blend into the system, such as /tmp, as it may reveal anomalous items.

ent In addition to such traditional malware file artifacts, consider functional context, including processes running from suspicious ...

Get Malware Forensics Field Guide for Linux Systems now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.