Loading…
Malware Analysis and Detection Using Reverse Engineering Technique
The increasing use of internet and technology today cannot be separated from cybercrime that can threaten its users. The cyber threat like malware attempts to infiltrate the computer or mobile device offline or the internet, chat (online) and anyone can be a potential target. Malware, also known as...
Saved in:
Published in: | Journal of physics. Conference series 2018-12, Vol.1140 (1), p.12042 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | The increasing use of internet and technology today cannot be separated from cybercrime that can threaten its users. The cyber threat like malware attempts to infiltrate the computer or mobile device offline or the internet, chat (online) and anyone can be a potential target. Malware, also known as malicious software, is often used by cybercriminals to achieve their goals by tracking internet activity, capturing sensitive information or block computer access. In the past two years, the more malicious software has been created than in the previous ten years combined. Malware has its own defense system and it is possible to hide from antivirus or even infect the antivirus itself. Malware can be handled by knowing how to work when doing an attack into a computer system. This research aims to analyze malware by using malware sample to better understanding how they can infect computers and devices, the level of threats they pose, and how to protect devices against them. |
---|---|
ISSN: | 1742-6588 1742-6596 |
DOI: | 10.1088/1742-6596/1140/1/012042 |