Reverse Engineering Malicious Applications

Ioan Cristian Iacob


Detecting new and unknown malware is a major challenge in today’s software. Security profession. A lot of approaches for the detection of malware using data mining techniques have already been proposed. Majority of the works used static features of malware. However, static detection methods fall short of detecting present day complex malware. Although some researchers proposed dynamic detection methods, the methods did not use all the malware features. In this work, an approach for the detection of new and unknown malware was proposed and implemented. Each sample was reverse engineered for analyzing its effect on the operating environment and to extract the static and behavioral features. 


Reverse Engineering, Applications, Malicious, Security, Malware

Full Text:



The “Practical Malware Analysis” book by Michael Sikorski and Andrew Honig

Bitdefender “Reverse Engineering Malware” course notes

Mandiant “Advanced Malware Analysis” course notes


  • There are currently no refbacks.

Journal of Mobile, Embedded and Distributed Systems (JMEDS) ISSN: 2067 – 4074 (online)