Malware Analysis



Useful Links

  1. Symantec Security Response. http://securityresponse.symantec.com .

  2. Clam AntiVirus. http://www.clamav.net . (Accessed on Sept 13, 2004).

  3. ClamWin: A Free AntiVirus For Windows. http://www.clamav.net . (Accessed on Sept 13, 2004).

  4. IBM Antivirus Research. http://www.research.ibm.com/antivirus/SciPapers.htm (Accessed on Sept 13, 2004).

  5. DataRescue. "IDA Pro Disassembler". http://www.datarescue.com (Accessed on Sept 13, 2004).

  6. Kaspersky, K. (2003). Hacker Disassembling Uncovered, A-LIST.

  7. Rosenberg, J. (1996). How Debuggers Work: Algorithms, Data Structures, and Architecture, WILEY.

  8. Stitt, M. DEBUGGING: Creative Techniques and Tools for Software Repair, WILEY.

  9. Symantec. The Digital Immune System. http://securityresponse.symantec.com/avcenter/whitepapers.html (Accessed on Sept 13, 2004).

  10. Sysinternals. (2004). Freeware Monitoring tools. http://www.sysinternals.com (Accessed on Sept 13, 2004).

  11. Vmware. (2004). Vmware is Virtual Infrastructure. http://www.vmware.com (Accessed on Sept 13, 2004).

  12. Yuschuk, O. OllyDbg - 32-bit assembler-level debugger. http://home.t-online.de/home/Ollydbg (Accessed on Sept 13, 2004).

  13. Zelster, L. (2004). Reverse Engineering Malware. http://www.zeltser.com/sans/gcih-practical (Accessed on Sept 13, 2004).


WCRE logo and graphics design - Copyright (C) 2004 Claire Knight, University of Delft. All Rights Reserved.
Web content - Copyright (C) 2004 University of Louisiana at Lafayette. All Rights Reserved.