DocumentCode :
3308202
Title :
MCARTA: A Malicious Code Automated Run-Time Analysis framework
Author :
Nolan, R.A. ; Chen, P.P.
Author_Institution :
Software Eng. Inst./CERT, Carnegie-Mellon Univ., Pittsburgh, PA, USA
fYear :
2012
fDate :
13-15 Nov. 2012
Firstpage :
13
Lastpage :
17
Abstract :
This paper describes MCARTA, a new malware analysis framework which speeds up the velocity of investigation with run-time malware analysis. MCARTA (Malicious Code Automated Run-Time Analysis) is based on a new approach to cataloging, tracking, and comparing malware that does not depend on reverse engineering. Using MCARTA the malware analysts can quickly identify a small set of highly suspicious files to zoom in for further investigation using reverse-engineering tools. Using MCARTA and reverse-engineering tools in sequence, we will get the best of both worlds.
Keywords :
invasive software; reverse engineering; MCARTA; malicious code automated run-time analysis; malware analysis; reverse-engineering tool; suspicious files; Algorithm design and analysis; Computer crime; Computer science; Computers; Educational institutions; Malware; anti-malware; automated run-time analysis; malicious code; malware; reverse-engineering of malware;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Homeland Security (HST), 2012 IEEE Conference on Technologies for
Conference_Location :
Waltham, MA
Print_ISBN :
978-1-4673-2708-4
Type :
conf
DOI :
10.1109/THS.2012.6459819
Filename :
6459819
Link To Document :
بازگشت