Synonyms
Definition
Dynamic malware analysis is the method used for extracting and determining malware’s execution behaviors.
Background
Today, malwares have become one of the serious threats on the Internet. Analysis of such malware behavior is a critical element in conducting malware defense and mitigation efforts. There are two methods of analyzing malwares – static malware analysis and dynamic malware analysis. Static analysis requires analysis of the malware code. The malware code is usually not available for analysis and even if it is available, the malware writer often obfuscates the code, making the static analysis difficult and time-consuming task.
Theory and Application
In contrast to static analysis, dynamic malware analysis allows the malware analyst to monitor the execution of malware at each step. The malware is typically executed in a sandbox or VM for monitoring the run-time behaviors of the malware. Unlike static analysis, dynamic analysis is...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
HookExplorer (n.d.) Internet
InstallRite (n.d.) Internet. http://ptf.com/download/installrite/23907/
Process Explorer (n.d.) Internet. http://technet.microsoft.com/en-us/sysinternals/bb896653
Process Monitor (n.d.) Internet. http://technet.microsoft.com/en-us/sysinternals/bb896645.aspx
Regshot (n.d.) Internet. http://sourceforge.net/projects/regshot/
TCPView (n.d.) Internet. http://technet.microsoft.com/en-us/sysinternals/bb897437
Willems C, Holz T, Freiling F (2007) Toward automated dynamic malware analysis using CWSandbox. IEEE Secur Priv 5(2):32–39
Wireshark (n.d.) Internet. http://technet.microsoft.com/en-us/sysinternals/bb897437
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2025 Springer Nature Switzerland AG
About this entry
Cite this entry
Kang, B.B.H., Srivastava, A. (2025). Dynamic Malware Analysis. In: Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Cham. https://doi.org/10.1007/978-3-030-71522-9_846
Download citation
DOI: https://doi.org/10.1007/978-3-030-71522-9_846
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-71520-5
Online ISBN: 978-3-030-71522-9
eBook Packages: Computer ScienceReference Module Computer Science and Engineering