Event Reconstruction Study Using Windows Restore Point and Reverse Engineering Concepts


Authors : Moza M; Zahra H; Sara R; Alya K; Hoda M; Charles Shibu

Volume/Issue : Volume 7 - 2022, Issue 5 - May

Google Scholar : https://bit.ly/3IIfn9N

Scribd : https://bit.ly/3ofWCCL

DOI : https://doi.org/10.5281/zenodo.6864561

Abstract : In this internet era almost all smart devices relate to eachother depending upon their uniqueness and usage pattern. Vivid applications were created and with multiple features thereby makingthem easy targets to be exploited [1]. Exploits usually are malwares that pose to be genuine and productive applications. These malwaresenter the system and cause serious losses in terms of information, hardware and other types of monetary losses. It is a wellknown fact that information stealing malwares and spywares steal personalinformation thereby making them available in social media or become seeds for furthermore attacks in the future [2]. Several researches have been carried out in the recent years in areas of Malware analysis to emphasize on the alarming increase of malwarethreats for a variety of platforms even in the presence of antimalware checks. In our article we are focusing on event reconstruction considering different malware analysis techniques and tools. Our focuss would be mainly to reconstruct and known attack with practical emphasis and thereby proposing mitigation solutions.

Keywords : Malware, Reverse Engineering Technology, Event Reconstruction, System Restore Point.

In this internet era almost all smart devices relate to eachother depending upon their uniqueness and usage pattern. Vivid applications were created and with multiple features thereby makingthem easy targets to be exploited [1]. Exploits usually are malwares that pose to be genuine and productive applications. These malwaresenter the system and cause serious losses in terms of information, hardware and other types of monetary losses. It is a wellknown fact that information stealing malwares and spywares steal personalinformation thereby making them available in social media or become seeds for furthermore attacks in the future [2]. Several researches have been carried out in the recent years in areas of Malware analysis to emphasize on the alarming increase of malwarethreats for a variety of platforms even in the presence of antimalware checks. In our article we are focusing on event reconstruction considering different malware analysis techniques and tools. Our focuss would be mainly to reconstruct and known attack with practical emphasis and thereby proposing mitigation solutions.

Keywords : Malware, Reverse Engineering Technology, Event Reconstruction, System Restore Point.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe