Event Reconstruction Study Using Windows Restore Point and Reverse Engineering Concepts

Moza M; Zahra H; Sara R; Alya K; Hoda M; Charles Shibu1

1

Publication Date: 2022/07/20

Abstract: In this internet era almost all smart devices relate to eachother depending upon their uniqueness and usage pattern. Vivid applications were created and with multiple features thereby makingthem easy targets to be exploited [1]. Exploits usually are malwares that pose to be genuine and productive applications. These malwaresenter the system and cause serious losses in terms of information, hardware and other types of monetary losses. It is a wellknown fact that information stealing malwares and spywares steal personalinformation thereby making them available in social media or become seeds for furthermore attacks in the future [2]. Several researches have been carried out in the recent years in areas of Malware analysis to emphasize on the alarming increase of malwarethreats for a variety of platforms even in the presence of antimalware checks. In our article we are focusing on event reconstruction considering different malware analysis techniques and tools. Our focuss would be mainly to reconstruct and known attack with practical emphasis and thereby proposing mitigation solutions.

Keywords: Malware, Reverse Engineering Technology, Event Reconstruction, System Restore Point.

DOI: https://doi.org/10.5281/zenodo.6864561

PDF: https://ijirst.demo4.arinfotech.co/assets/upload/files/IJISRT22MAY433.pdf

REFERENCES

No References Available