Malware Detection and Analysis Using Reverse Engineering

  • Muhammad Taseer Suleman School of Electrical Engineering and Computer Sciences, NUST, Islamabad, Pakistan

Abstract

The pervasive and persistent nature of malware in the contemporary digital realm demands sophisticated methodologies for detection and analysis. Reverse engineering has emerged as a pivotal strategy in malware analysis, offering the means to unravel the intricate workings of malicious code. This
research paper presents a comprehensive exploration of the role of reverse engineering in the
domain of malware detection and analysis. It delves into the fundamental stages of the reverse
engineering process, encompassing code disassembly, static analysis, and dynamic analysis. Additionally, reverse engineering facilitates meticulous analysis of malware, encompassing intricate
examination of its structural attributes, operational mechanisms, and behavioral characteristics.
However, the landscape of reverse engineering is not devoid of challenges. Malware authors employ
sophisticated obfuscation techniques and antianalysis mechanisms to impede reverse engineering
endeavors. These measures encompass code encryption, packing, anti-debugging, and anti-virtualization strategies. By providing a comprehensive examination of the important role of reverse
engineering in malware detection and analysis, this research paper will elucidate an extensive array
of tools and methodologies.

Published
2024-03-13