Imaging and evaluating the memory access for malware
| dc.contributor.author | Cagatay Yucel | |
| dc.contributor.author | Ahmet Koltuksuz | |
| dc.contributor.author | Yücel, Çağatay | |
| dc.contributor.author | Koltuksuz, Ahmet | |
| dc.date | MAR | |
| dc.date.accessioned | 2025-10-06T16:19:54Z | |
| dc.date.issued | 2020 | |
| dc.description.abstract | Malware analysis is a forensic process. After infection and the damage represented itself with the full scale then the analysis of the attack the structure of the executable and the aim of the malware can be discovered. These discoveries are converted into analysis reports and malware signatures and shared among antivirus databases and threat intelligence exchange platforms. This highly valuable information is then utilized in the detection mechanisms to prevent further dissemination and infections of malware. The types of analysis of the malware sample in this process can be grouped into two categories: static analysis and dynamic analysis. In static analysis the executable file is reverted to the source code through disassemblers and reverse engineering software and analyzed whereas dynamic analysis includes running the sample in an isolated environment and analyzing its behavior. Both static and dynamic analysis have limitations such as packing obfuscation dead code insertion sandbox detection and anti-debugging techniques. Memory operations on the other hand are not possible to hide by these limitations and inevitable for any software since the inventions of the computational models. Therefore in this research memory operations and access patterns for the malicious acts are examined and a contribution of a novel approach for extracting of memory access images is presented. In addition to extraction methods of how these images can be used for detection and comparison is introduced through an image comparison technique. (C) 2020 Elsevier Ltd. All rights reserved. | |
| dc.identifier.doi | 10.1016/j.fsidi.2019.200903 | |
| dc.identifier.issn | 2666-2817 | |
| dc.identifier.issn | 2666-2825 | |
| dc.identifier.scopus | 2-s2.0-85089857667 | |
| dc.identifier.uri | http://dx.doi.org/10.1016/j.fsidi.2019.200903 | |
| dc.identifier.uri | https://gcris.yasar.edu.tr/handle/123456789/6079 | |
| dc.identifier.uri | https://doi.org/10.1016/j.fsidi.2019.200903 | |
| dc.language.iso | English | |
| dc.publisher | ELSEVIER SCI LTD | |
| dc.relation.ispartof | Forensic Science International: Digital Investigation | |
| dc.rights | info:eu-repo/semantics/closedAccess | |
| dc.source | FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION | |
| dc.subject | Malware analysis, Malware imaging, Memory analysis, Dynamical binary analysis, Memory operations analysis | |
| dc.subject | CONTROL-FLOW GRAPH, CLASSIFICATION | |
| dc.subject | Malware Analysis | |
| dc.subject | Memory Analysis | |
| dc.subject | Malware Imaging | |
| dc.subject | Dynamical Binary Analysis | |
| dc.subject | Memory Operations Analysis | |
| dc.title | Imaging and evaluating the memory access for malware | |
| dc.type | Article | |
| dspace.entity.type | Publication | |
| gdc.author.id | Yücel, Çağatay/0000-0002-4901-5954 | |
| gdc.author.scopusid | 56285502500 | |
| gdc.author.scopusid | 13408802300 | |
| gdc.author.wosid | koltuksuz, ahmet/AAJ-5658-2021 | |
| gdc.bip.impulseclass | C4 | |
| gdc.bip.influenceclass | C4 | |
| gdc.bip.popularityclass | C4 | |
| gdc.coar.type | text::journal::journal article | |
| gdc.collaboration.industrial | false | |
| gdc.description.department | ||
| gdc.description.departmenttemp | [Yucel, Cagatay; Koltuksuz, Ahmet] Yasar Univ, Fac Engn, Comp Engn Dept, Bornova, Turkey | |
| gdc.description.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | |
| gdc.description.startpage | 200903 | |
| gdc.description.volume | 32 | |
| gdc.description.woscitationindex | Science Citation Index Expanded | |
| gdc.identifier.openalex | W3003302059 | |
| gdc.identifier.wos | WOS:000531075000003 | |
| gdc.index.type | WoS | |
| gdc.index.type | Scopus | |
| gdc.oaire.diamondjournal | false | |
| gdc.oaire.impulse | 10.0 | |
| gdc.oaire.influence | 3.4870904E-9 | |
| gdc.oaire.isgreen | true | |
| gdc.oaire.popularity | 1.2955079E-8 | |
| gdc.oaire.publicfunded | false | |
| gdc.oaire.sciencefields | 0202 electrical engineering, electronic engineering, information engineering | |
| gdc.oaire.sciencefields | 02 engineering and technology | |
| gdc.openalex.collaboration | National | |
| gdc.openalex.fwci | 2.5903 | |
| gdc.openalex.normalizedpercentile | 0.9 | |
| gdc.openalex.toppercent | TOP 10% | |
| gdc.opencitations.count | 15 | |
| gdc.plumx.crossrefcites | 12 | |
| gdc.plumx.mendeley | 81 | |
| gdc.plumx.scopuscites | 29 | |
| gdc.scopus.citedcount | 29 | |
| gdc.virtual.author | Yücel, Çağatay | |
| gdc.virtual.author | Koltuksuz, Ahmet Hasan | |
| gdc.wos.citedcount | 22 | |
| person.identifier.orcid | Yucel- Cagatay/0000-0002-4901-5954 | |
| publicationvolume.volumeNumber | 32 | |
| relation.isAuthorOfPublication | 516a87df-891f-458d-994e-b459294fda36 | |
| relation.isAuthorOfPublication | 0a146451-eb5a-43c9-bfca-979da9ee51d7 | |
| relation.isAuthorOfPublication.latestForDiscovery | 516a87df-891f-458d-994e-b459294fda36 | |
| relation.isOrgUnitOfPublication | ac5ddece-c76d-476d-ab30-e4d3029dee37 | |
| relation.isOrgUnitOfPublication.latestForDiscovery | ac5ddece-c76d-476d-ab30-e4d3029dee37 |
