Abstract Views :203 |
PDF Views:128
Authors
Affiliations
1 Center for Development of Advanced Computing, Hyderabad, IN
2 Center for Development of Advanced Computing, Bangalore, IN
Source
AIRCC's International Journal of Computer Science and Information Technology, Vol 5, No 2 (2013), Pagination: 53-61
Abstract
Number and complicacy of malware attack has increased multiple folds in recent times. Informed Internet users generally keep their computer protected but get confused when it comes to execute the untrusted applications. In such cases users may fall prey to malicious applications. There are malware behavior analyzers available but leave report analysis to the user. Common users are not trained to understand and analyze these reports, and generally expect direct recommendation whether to execute this application on their computer. This research paper tries to analyze behavior and help the common users and analysts to quickly classify an application as safe or malicious.
Keywords
Application Analysis, Trojan, Automated Malware Analysis.
Full Text