Malware Analysis
Saffaf, Mohammad Nour (2009)
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:amk-200905313492
https://urn.fi/URN:NBN:fi:amk-200905313492
Tiivistelmä
The number of computer viruses in circulation has reached one million for the first time, according to a report by Symantec, a leading security firm. The Internet has become an
essential part of everyday life. As a result sensitive, personal and credit cards information are examples of monetary gains to virus writers.
The main objective of this thesis was to present a technical overview of existing malware mechanisms and protections and how the malware forensics counter-attack techniques can be applied. Likewise, the limitations of anti-virus programs and the current computer security was discussed.
Besides with the theoretical study of the methods of malware forensics that can be used against malware attacks, a practical case study was carried out to attain better understanding of malware internals and current forensics tools.
The result of this thesis highlighted the importance and the limitations of the forensics techniques for fighting current and future malware. Malware uses advanced techniques to protect and hide itself from both protection and forensics tools. Therefore, achieving efficient software security is difficult and absolute protection is impossible under the
current computer architecture.
essential part of everyday life. As a result sensitive, personal and credit cards information are examples of monetary gains to virus writers.
The main objective of this thesis was to present a technical overview of existing malware mechanisms and protections and how the malware forensics counter-attack techniques can be applied. Likewise, the limitations of anti-virus programs and the current computer security was discussed.
Besides with the theoretical study of the methods of malware forensics that can be used against malware attacks, a practical case study was carried out to attain better understanding of malware internals and current forensics tools.
The result of this thesis highlighted the importance and the limitations of the forensics techniques for fighting current and future malware. Malware uses advanced techniques to protect and hide itself from both protection and forensics tools. Therefore, achieving efficient software security is difficult and absolute protection is impossible under the
current computer architecture.