Dr. Chandrashekhar Uppin Profile Dr. Chandrashekhar Uppin

Dynamic analysis of a window-based malware using automated sandboxing

  • Authors Details :  
  • Chandrashekhar Uppin

178 Views Original Article

Malwares are one of the most dangerous security threats in today’s world of fast growing technology. Now, it is not impossible to remotely lock down a system’s files for ransoms even when it is located overseas. This threat was accelerated when the world was introduced to cryptocurrency (for e.g., Bitcoins). It allowed the attackers to hide their tracks more efficiently. From a simple idea of testing the efficiency of a computer system to the most critical and sophisticated cyber-attack, malwares has evolved over the years and appeared time to time. Even with the smartest technologies today where we are trying to include Machine learning and Deep learning to every field of our life, the attackers are already developing more sophisticated malwares using the same Machine learning and Deep learning techniques. This raises the question on the security of the cyber-world and how we are able to protect it. In this work, we are presenting an analysis on a recent and most critical Windows malware called “LockerGoga”. Both static and dynamic analyses are performed on the malware to understand the behavior and characteristics of the malware.

Article Subject Details


Article Keywords Details



Article File

Full Text PDF





More Article by Dr. Chandrashekhar Uppin

Enhancing viral pneumonia diagnosis accuracy using transfer learning and ensemble technique from chest x-ray images

Pneumonia is an acute pulmonary infection that can be caused by bacteria, viruses, or fungi. it infects the lungs, causing inflammation of the air sacs and pleural effusion: a cond...

A natural language processing approach to determine the polarity and subjectivity of iphone 12 twitter feeds using textblob

Sentiment analysis and opinion mining is a branch of computer science that has gained considerable growth over the last decade. this branch of computer science deals with determini...

A proactive approach to network forensics intrusion (denial of service flood attack) using dynamic features, selection and convolution neural network

Currently, the use of internet-connected applications for storage by different organizations have rapidly increased with the vast need to store data, cybercrimes are also increasin...

A comprehensive review for security analysis of iot platforms

Due to the rapid growth in the field of science and technology, iot (internet of things) has become emerging technique for connecting heterogeneous technologies related to our dail...