Imaging and evaluating the memory access for malware

dc.contributor.author Cagatay Yucel
dc.contributor.author Ahmet Koltuksuz
dc.contributor.author Yücel, Çağatay
dc.contributor.author Koltuksuz, Ahmet
dc.date MAR
dc.date.accessioned 2025-10-06T16:19:54Z
dc.date.issued 2020
dc.description.abstract Malware analysis is a forensic process. After infection and the damage represented itself with the full scale then the analysis of the attack the structure of the executable and the aim of the malware can be discovered. These discoveries are converted into analysis reports and malware signatures and shared among antivirus databases and threat intelligence exchange platforms. This highly valuable information is then utilized in the detection mechanisms to prevent further dissemination and infections of malware. The types of analysis of the malware sample in this process can be grouped into two categories: static analysis and dynamic analysis. In static analysis the executable file is reverted to the source code through disassemblers and reverse engineering software and analyzed whereas dynamic analysis includes running the sample in an isolated environment and analyzing its behavior. Both static and dynamic analysis have limitations such as packing obfuscation dead code insertion sandbox detection and anti-debugging techniques. Memory operations on the other hand are not possible to hide by these limitations and inevitable for any software since the inventions of the computational models. Therefore in this research memory operations and access patterns for the malicious acts are examined and a contribution of a novel approach for extracting of memory access images is presented. In addition to extraction methods of how these images can be used for detection and comparison is introduced through an image comparison technique. (C) 2020 Elsevier Ltd. All rights reserved.
dc.identifier.doi 10.1016/j.fsidi.2019.200903
dc.identifier.issn 2666-2817
dc.identifier.issn 2666-2825
dc.identifier.scopus 2-s2.0-85089857667
dc.identifier.uri http://dx.doi.org/10.1016/j.fsidi.2019.200903
dc.identifier.uri https://gcris.yasar.edu.tr/handle/123456789/6079
dc.identifier.uri https://doi.org/10.1016/j.fsidi.2019.200903
dc.language.iso English
dc.publisher ELSEVIER SCI LTD
dc.relation.ispartof Forensic Science International: Digital Investigation
dc.rights info:eu-repo/semantics/closedAccess
dc.source FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION
dc.subject Malware analysis, Malware imaging, Memory analysis, Dynamical binary analysis, Memory operations analysis
dc.subject CONTROL-FLOW GRAPH, CLASSIFICATION
dc.subject Malware Analysis
dc.subject Memory Analysis
dc.subject Malware Imaging
dc.subject Dynamical Binary Analysis
dc.subject Memory Operations Analysis
dc.title Imaging and evaluating the memory access for malware
dc.type Article
dspace.entity.type Publication
gdc.author.id Yücel, Çağatay/0000-0002-4901-5954
gdc.author.scopusid 56285502500
gdc.author.scopusid 13408802300
gdc.author.wosid koltuksuz, ahmet/AAJ-5658-2021
gdc.bip.impulseclass C4
gdc.bip.influenceclass C4
gdc.bip.popularityclass C4
gdc.coar.type text::journal::journal article
gdc.collaboration.industrial false
gdc.description.department
gdc.description.departmenttemp [Yucel, Cagatay; Koltuksuz, Ahmet] Yasar Univ, Fac Engn, Comp Engn Dept, Bornova, Turkey
gdc.description.publicationcategory Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı
gdc.description.startpage 200903
gdc.description.volume 32
gdc.description.woscitationindex Science Citation Index Expanded
gdc.identifier.openalex W3003302059
gdc.identifier.wos WOS:000531075000003
gdc.index.type WoS
gdc.index.type Scopus
gdc.oaire.diamondjournal false
gdc.oaire.impulse 10.0
gdc.oaire.influence 3.4870904E-9
gdc.oaire.isgreen true
gdc.oaire.popularity 1.2955079E-8
gdc.oaire.publicfunded false
gdc.oaire.sciencefields 0202 electrical engineering, electronic engineering, information engineering
gdc.oaire.sciencefields 02 engineering and technology
gdc.openalex.collaboration National
gdc.openalex.fwci 2.5903
gdc.openalex.normalizedpercentile 0.9
gdc.openalex.toppercent TOP 10%
gdc.opencitations.count 15
gdc.plumx.crossrefcites 12
gdc.plumx.mendeley 81
gdc.plumx.scopuscites 29
gdc.scopus.citedcount 29
gdc.virtual.author Yücel, Çağatay
gdc.virtual.author Koltuksuz, Ahmet Hasan
gdc.wos.citedcount 22
person.identifier.orcid Yucel- Cagatay/0000-0002-4901-5954
publicationvolume.volumeNumber 32
relation.isAuthorOfPublication 516a87df-891f-458d-994e-b459294fda36
relation.isAuthorOfPublication 0a146451-eb5a-43c9-bfca-979da9ee51d7
relation.isAuthorOfPublication.latestForDiscovery 516a87df-891f-458d-994e-b459294fda36
relation.isOrgUnitOfPublication ac5ddece-c76d-476d-ab30-e4d3029dee37
relation.isOrgUnitOfPublication.latestForDiscovery ac5ddece-c76d-476d-ab30-e4d3029dee37

Files