Lecture - 01 - Introduction To Malware Analysis PDF
Lecture - 01 - Introduction To Malware Analysis PDF
Introduction
Overview
• What is Malware?
• Types of malware
• The goals of malware analysis
• Malware analysis techniques
• General rules for malware analysis
What is Malware?
• Host-based Signatures
– Used to detect malicious code on victim computers
– These signatures identify files created or modified or changes
made to the registry
– Focus on what a malware does to a system, unlike anti-virus
signatures which mostly focus on malware’s own
characteristics
– This is useful in case of malware that changes form or is
deleted from the hard disk
Malware Signatures
• Network Signatures
– Used to detect malicious code by monitoring network traffic
– Network signatures can be created without malware analysis
– However, network signatures created with malware analysis
offer greater detection rate and reduce false positives