Malware memory analysis for non-specialists : investigating publicly available memory images for Prolaco and SpyEye / by R. Carbone. : D68-6/155-2013E-PDF
This technical memorandum examines how an investigator can analyse an infected Windows memory dump. The author investigates how to carry out such an analysis using Volatility and other investigative tools, including data carving utilities and anti-virus scanners. Volatility is a popular and evolving open source-based memory analysis framework upon which the author has proposed a memory-specific methodology for aiding fellow novice memory analysts. The author examines how Volatility can be used to find evidence and indicators of infection. This technical memorandum is the second in a series concerning Windows malware-based memory analysis. This current work examines two memory images infected with Prolaco and SpyEye, respectively.
Lien permanent pour cette publication :
publications.gc.ca/pub?id=9.821332&sl=1
| Ministère/Organisme |
|
|---|---|
| Titre | Malware memory analysis for non-specialists : investigating publicly available memory images for Prolaco and SpyEye / by R. Carbone. |
| Titre de la série |
|
| Type de publication | Monographie - Voir l'enregistrement principal |
| Langue | [Anglais] |
| Format | Texte numérique |
| Document électronique | |
| Note(s) |
|
| Information sur la publication |
|
| Auteur / Contributeur |
|
| Description | xiv, 102 p. : tables, graphs. |
| Numéro de catalogue |
|
| Descripteurs |
Demander des formats alternatifs
Pour demander une publication dans un format alternatif, remplissez le formulaire électronique des publications du gouvernement du Canada. Utilisez le champ du formulaire «question ou commentaire» pour spécifier la publication demandée.Détails de la page
- Date de modification :