Number and complicacy of malware attack has increased multiple folds in recent times. Informed Internet users generally keep their computer protected but get confused when it comes to execute the untrusted applications. In such cases users may fall prey to malicious applications. There are malware behavior analyzers available but leave report analysis to the user. Common users are not trained to understand and analyze these reports, and generally expect direct recommendation whether to execute this application on their computer. This research paper tries to analyze behavior and help the common users and analysts to quickly classify an application as safe or malicious.
Keywords
Application Analysis, Trojan, Automated Malware Analysis.
User
Font Size
Information