Title :
MCARTA: A Malicious Code Automated Run-Time Analysis framework
Author :
Nolan, R.A. ; Chen, P.P.
Author_Institution :
Software Eng. Inst./CERT, Carnegie-Mellon Univ., Pittsburgh, PA, USA
Abstract :
This paper describes MCARTA, a new malware analysis framework which speeds up the velocity of investigation with run-time malware analysis. MCARTA (Malicious Code Automated Run-Time Analysis) is based on a new approach to cataloging, tracking, and comparing malware that does not depend on reverse engineering. Using MCARTA the malware analysts can quickly identify a small set of highly suspicious files to zoom in for further investigation using reverse-engineering tools. Using MCARTA and reverse-engineering tools in sequence, we will get the best of both worlds.
Keywords :
invasive software; reverse engineering; MCARTA; malicious code automated run-time analysis; malware analysis; reverse-engineering tool; suspicious files; Algorithm design and analysis; Computer crime; Computer science; Computers; Educational institutions; Malware; anti-malware; automated run-time analysis; malicious code; malware; reverse-engineering of malware;
Conference_Titel :
Homeland Security (HST), 2012 IEEE Conference on Technologies for
Conference_Location :
Waltham, MA
Print_ISBN :
978-1-4673-2708-4
DOI :
10.1109/THS.2012.6459819