Authors :
Moza M; Zahra H; Sara R; Alya K; Hoda M; Charles Shibu
Volume/Issue :
Volume 7 - 2022, Issue 5 - May
Google Scholar :
https://bit.ly/3IIfn9N
Scribd :
https://bit.ly/3ofWCCL
DOI :
https://doi.org/10.5281/zenodo.6864561
Abstract :
In this internet era almost all smart devices
relate to eachother depending upon their uniqueness and
usage pattern. Vivid applications were created and with
multiple features thereby makingthem easy targets to be
exploited [1]. Exploits usually are malwares that pose to be
genuine and productive applications. These malwaresenter
the system and cause serious losses in terms of information,
hardware and other types of monetary losses. It is a wellknown fact that information stealing malwares and
spywares steal personalinformation thereby making them
available in social media or become seeds for furthermore
attacks in the future [2]. Several researches have been
carried out in the recent years in areas of Malware analysis
to emphasize on the alarming increase of malwarethreats
for a variety of platforms even in the presence of antimalware checks. In our article we are focusing on event
reconstruction considering different malware analysis
techniques and tools. Our focuss would be mainly to
reconstruct and known attack with practical emphasis and
thereby proposing mitigation solutions.
Keywords :
Malware, Reverse Engineering Technology, Event Reconstruction, System Restore Point.
In this internet era almost all smart devices
relate to eachother depending upon their uniqueness and
usage pattern. Vivid applications were created and with
multiple features thereby makingthem easy targets to be
exploited [1]. Exploits usually are malwares that pose to be
genuine and productive applications. These malwaresenter
the system and cause serious losses in terms of information,
hardware and other types of monetary losses. It is a wellknown fact that information stealing malwares and
spywares steal personalinformation thereby making them
available in social media or become seeds for furthermore
attacks in the future [2]. Several researches have been
carried out in the recent years in areas of Malware analysis
to emphasize on the alarming increase of malwarethreats
for a variety of platforms even in the presence of antimalware checks. In our article we are focusing on event
reconstruction considering different malware analysis
techniques and tools. Our focuss would be mainly to
reconstruct and known attack with practical emphasis and
thereby proposing mitigation solutions.
Keywords :
Malware, Reverse Engineering Technology, Event Reconstruction, System Restore Point.