Open Access Open Access  Restricted Access Subscription or Fee Access

Network Security Using Assembly Level Programming

S Murugan

Abstract


Malware are energizing sorts of projects to try different things with one of the upsides of utilizing low level computing construct. Malware have been utilized to slaughter other malware. One could think about malware and worms that circled through a framework doing helpful errands without direct intercession of specific clients. The capacity to forensically dissect malevolent programming is turning into an undeniably vital control in the field of Digital Forensics. This is on the grounds that malware is getting to be stealthier, focused on, benefit driven, oversaw by criminal associations, harder to distinguish and much harder to examine. Malware examination requires an impressive aptitude set to investigate profound malware internals when it is planned particularly to distinguish and keep down such endeavors. An excess of apparatuses are accessible to the examiner including debuggers, disassemblers, de-compilers, memory dumpers, unpackers and in addition numerous different devices basic to the control of programming designing. All of these tools require niche expertise and a thorough understanding of the principles of their operation and the computers they execute on.
Keywords: compliers, debuggers, disassemblers, malware

Full Text:

PDF

References


The Malware Analysis Body of Knowledge–By Craig Valli and Murray Brand.

Reverse Engineering Malware–By Lenny Zeltser

Malware analysis : An Introduction–By Dennis Distler

Introduction to Malware Analysis–By Lenny Zeltser

Practical Malware Analysis–By Kris Kendall

Symantec Internet Security Threat Report

http://www.datarescue.com

http://d-dome.net/idapython

http://www.wikipedia.com

http://www.jcots.state.va.us

http://www.technet.microsoft.com

http://www.zeltser.com




DOI: https://doi.org/10.37628/ijece.v1i2.106

Refbacks

  • There are currently no refbacks.