Scheduled System Maintenance:
Some services will be unavailable Sunday, March 29th through Monday, March 30th. We apologize for the inconvenience.
By Topic

MCARTA: A Malicious Code Automated Run-Time Analysis framework

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Nolan, R.A. ; Software Eng. Inst./CERT, Carnegie-Mellon Univ., Pittsburgh, PA, USA ; Chen, P.P.

This paper describes MCARTA, a new malware analysis framework which speeds up the velocity of investigation with run-time malware analysis. MCARTA (Malicious Code Automated Run-Time Analysis) is based on a new approach to cataloging, tracking, and comparing malware that does not depend on reverse engineering. Using MCARTA the malware analysts can quickly identify a small set of highly suspicious files to zoom in for further investigation using reverse-engineering tools. Using MCARTA and reverse-engineering tools in sequence, we will get the best of both worlds.

Published in:

Homeland Security (HST), 2012 IEEE Conference on Technologies for

Date of Conference:

13-15 Nov. 2012