Reverse Engineering Reverse Engineering Analysis Forensic Malware WEBC2-Div
Main Article Content
Abstract
At this paper focus on Malicious Software also known as Malware APT1 (Advance Persistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator successful user to realized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected packet in network and analysis of malware behavior and disassembler body malware.
Article Details
Copyright Notice
Authors who publish with Journal of Informatics, Information System, Software Engineering and Applications (INISTA) agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
References
[2] D Distler, "Malware Analysis : An Introduction," Journal Of SANS Institute, 2007.
[3] Joshua.I.J., Alan.H., Chen-Ching. L dan Pavel. G Ahmed.F.S., "Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes," in 4th International Conference on Digital Forensics and Cyber Crime ICDF2C 2012, Lafayette, Indiana, USA, 2012.
[4] P., dan Grance, T Mell, "The NIST definition of cloud," U.S, 2011.
[5] E. Al., Jebril, I. H., dan Zaqaibeh, B Daoud, "Vol 1. No.2 Computer Virus Stategies and Detection Methods," in Int. J. Open Probles Compt. Math., 2 September 2008.
[6] C., Merwe, A.V.D dan Paula, k Mariana, "Secure Computing Benefits, Risk and Controls," IEEE-Information Security, p. Soutch Africa, 2011.
[7] Michael, H dan Andrew Sikroski., Practical Malware Analysis. San Fransisco, 2012.
[8] S. Y., Prayudi, Y dan Riyadi, I Syarif, "Implementation of Malware Analysis using Static and Dynamic Analysis Method," International Journal of Computer Applications, vol. 117, no. 6, pp. 11 - 15, 2015.
[9] T., Zahid, M dan Ahmad, G Mahboob, "Adopting Information Security Techniques for Cloud Computing–A Survey," in International Conference on Information Technology, Yogyakarta, 2016, pp. pp 7 - 11.
[10] A dan Opera, A Juels, "New Approached to Security and Availabilitu to Cloud COmpuing," AC<-RSA Lboratories, 2013.
[11] D dan Nandi, S Devi, "Detection of Packed Malware," in Proceeding SecurIT '12 Proceedings of the First International Conference on Security of Internet of Things, NY, 2012, pp. 22 - 26.
[12] M., Valli, C dan Woodward, A Brand, "Malware Forensics: Discovery of the Intent of Deception," Journal of Digital Forensics, Security and Law, vol. Vol 5, no. 4, pp. 31 - 42, 2010.
[13] M., Fox, A., Griffith, R., Joseph, A. D dan Katz, R Armbrust, "A view of cloud computing," in Communications of the ACM, 2010, pp. pp 50-58.
[14] M., Yegneswaran, V., Saidi, H., Porras, P dan Lee, W Sharif, Eureka: A Framework for Enabling Static Malware Analysis. Berlin, Heidelberg: Springer, 2008, pp. 481-500.
[15] K dan Moon, B-R Kim, "Malware detection based on dependency graph," in in: Proceedings of the 12th annual conference on Genetic and evolutionary computation, NY, USA, 2010, pp. 12-18.
[16] S., Zheng, N., Xu, J., Xu, M dan Zhang, H Shang, "Detecting malware variants via function-call graph similarity," in in: 5th International Conference on Malicious and Unwanted, Nancy, France, October 19–20, 2010, pp. 113-120.
[17] M Davis, S Bodmer, and A Lemasters, Hacking Exposed Malware and Rootkits.: McGraw-Hill, Inc, 2010.
[18] H and Lee Jeong K, "Code graph for malware detection, in:Information Networking," ICOIN (International Conference), pp. 1-5, 2008.
[19] Waliulu Faisal Raditya, "RANCANG BANGUN APLIKASI UNTUK MENYERANG BALIK DARI PENGGUNA NETCUT DIJARINGAN LOCAL DENGAN MENGGUNAKAN DDOS," Skripsi, Fakultas Ilmu Komputer., 2013.