By Topic

MCARTA: A Malicious Code Automated Run-Time Analysis framework

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.
2 Author(s)
Nolan, R.A. ; Software Eng. Inst./CERT, Carnegie-Mellon Univ., Pittsburgh, PA, USA ; Chen, P.P.

This paper describes MCARTA, a new malware analysis framework which speeds up the velocity of investigation with run-time malware analysis. MCARTA (Malicious Code Automated Run-Time Analysis) is based on a new approach to cataloging, tracking, and comparing malware that does not depend on reverse engineering. Using MCARTA the malware analysts can quickly identify a small set of highly suspicious files to zoom in for further investigation using reverse-engineering tools. Using MCARTA and reverse-engineering tools in sequence, we will get the best of both worlds.

Published in:

Homeland Security (HST), 2012 IEEE Conference on Technologies for

Date of Conference:

13-15 Nov. 2012