There are three typical use cases that drive the need for malware analysis:
The method by which malware analysis is performed typically falls under one of two types:
Examining malicious software involves several stages, including, but not limited to the following:
"International Journal of Advanced Research in Malware Analysis" (PDF). ijarcsse. Archived from the original (PDF) on 2016-04-18. Retrieved 2016-05-30. https://web.archive.org/web/20160418151823/http://www.ijarcsse.com/docs/papers/Volume_3/4_April2013/V3I4-0371.pdf ↩
"Malware Definition". Retrieved 2016-05-30. http://searchmidmarketsecurity.techtarget.com/definition/malware ↩
Honig, Andrew; Sikorski, Michael (February 2012). Practical Malware Analysis. No Starch Press. ISBN 9781593272906. Retrieved 5 July 2016. 9781593272906 ↩
Keragala, Dilshan (January 2016). "Detecting Malware and Sandbox Evasion Techniques". SANS Institute. https://www.sans.org/reading-room/whitepapers/forensics/detecting-malware-sandbox-evasion-techniques-36667 ↩