Εμφάνιση απλής εγγραφής

Malware Analysis and Reverse Engineering

dc.contributor.advisorΓιαννακόπουλος, Παναγιώτης
dc.contributor.authorΧρόνης, Αναστάσιος
dc.date.accessioned2023-08-30T08:36:40Z
dc.date.available2023-08-30T08:36:40Z
dc.date.issued2023-03-09
dc.identifier.urihttps://polynoe.lib.uniwa.gr/xmlui/handle/11400/4968
dc.identifier.urihttp://dx.doi.org/10.26265/polynoe-4806
dc.description.abstractMalware is a constantly growing threat to both individuals and organizations as it can be used to steal sensitive data, disrupt both minor and vital operations, and in some cases cause physical damage to hardware and even humans. Reverse engineering is a powerful tool for analyzing and understanding software, hardware and, in our case, malware. It allows analysts to disassemble and decompile the code to determine its functionality and identify vulnerabilities. In this thesis, we present a comprehensive study of malware analysis and reverse engineering techniques. We will begin by setting up a safe Lab environment, capable of protecting the analyst while also providing them the tools needed to do their job. The second part will be dedicated to Malware Analysis, starting with reviewing the history and types of malware, before delving deeper, with tools and techniques used in Static and Dynamic Analysis, code deobfuscation and closing with a concise workflow. The third part will be reviewing Reverse Engineering tools and techniques as well as its importance in a malware analyst’s repertoire. We also discuss the ethical concerns of malware analysis and reverse engineering, like the legal issues surrounding the possession and distribution of malware, as well as the importance of a professional approach to the matter. Finally, we will make a small statement about the future of Malware Analysis and Reverse Engineering and provide use cases that Machine Learning can be used to help the analysts secure an overall safer technological infrastructure. Our work serves as an introduction point for cybersecurity analysts and computer or software engineers that want to dig deeper into malware analysis.el
dc.format.extent72el
dc.language.isoenel
dc.publisherΠανεπιστήμιο Δυτικής Αττικήςel
dc.publisherState University of Moldovaen
dc.publisherTechnical University of Moldovaen
dc.publisherAcademy of Economic Studies of Moldovaen
dc.publisherAlecu Russo State University of Bălțien
dc.publisherL. N. Gumilyov Eurasian National Universityen
dc.rightsΑναφορά Δημιουργού - Μη Εμπορική Χρήση - Παρόμοια Διανομή 4.0 Διεθνές*
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Διεθνές*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectMalware analysisel
dc.subjectReverse engineeringel
dc.titleMalware Analysis and Reverse Engineeringel
dc.title.alternativeΑνάλυση Κακόβουλου Λογισμικού και Αντίστροφη Μηχανικήel
dc.typeΜεταπτυχιακή διπλωματική εργασίαel
dc.contributor.committeeKogias, Dimitrios
dc.contributor.committeeΜαυρομάτης, Κωνσταντίνος
dc.contributor.facultyΣχολή Μηχανικώνel
dc.contributor.departmentΤμήμα Μηχανικών Πληροφορικής και Υπολογιστώνel
dc.contributor.masterΚυβερνοασφάλειαel


Αρχεία σε αυτό το τεκμήριο

Thumbnail

Αυτό το τεκμήριο εμφανίζεται στις ακόλουθες συλλογές

Εμφάνιση απλής εγγραφής

Αναφορά Δημιουργού - Μη Εμπορική Χρήση - Παρόμοια Διανομή 4.0 Διεθνές
Εκτός από όπου επισημαίνεται κάτι διαφορετικό, το τεκμήριο διανέμεται με την ακόλουθη άδεια:
Αναφορά Δημιουργού - Μη Εμπορική Χρήση - Παρόμοια Διανομή 4.0 Διεθνές