May 2012
Intermediate to advanced
560 pages
12h 55m
English
• Goals
• Guidelines for Examining a Malicious File Specimen
• Establishing the Environment Baseline
• Pre-execution Preparation: System and Network Monitoring
• Execution Artifact Capture: Digital Impression and Trace Evidence
• Executing the Malware Specimen
• Execution Trajectory Analysis: Observing Network, Process, API, File System, and Registry Activity
• Automated Malware Analysis Frameworks
• Online Malware Analysis Sandboxes
• Defeating Obfuscation
• Embedded Artifacts Revisited
• Interacting with and Manipulating the Malware Specimen: Exploring and Verifying Specimen Functionality and Purpose
• Event Reconstruction and Artifact Review: Post-run Data Analysis
• Digital ...