Explore chapters and articles related to this topic
Malware Detection and Mitigation
Published in Nicholas Kolokotronis, Stavros Shiaeles, Cyber-Security Threats, Actors, and Dynamic Mitigation, 2021
Gueltoum Bendiab, Stavros Shiaeles, Nick Savage
Process Explorer10 is famous free tool developed by Microsoft. This tool can be used for performing dynamic malware analysis. Process Explorer is used for monitoring the running processes and shows the handles and DLLs that are running and loaded for each process. This tool is an excellent replacement for Task Manager, especially for Windows OS up to and including Windows 7. In addition to the regular options offered by Task Manager, Process Explorer has extra ones that are very helpful for analyzing suspicious infected systems. For instance, Process Explorer allows malware analysts to check the running processes and loaded DLLs on the online malware repository VirusTotal11.
A countless variant simulation-based toolkit for remote learning and evaluation
Published in Cogent Engineering, 2023
Felipe Romero, Gerardo Bandera, Javier Romero, Luis F. Romero
Module 5: Input/Output and Operating Systems: a) Preemptive multitasking and time quanta: A microscopic view of how the operating system deals with multitasking using time slicing. Any process can be blocked due to interrupts (Figure 2). b) Interruptions and Daisy Chain: Three devices can set external interrupts, which may be masked individually or globally. The acknowledged response to interruptions is managed by a daisy–chain module.c) Wator: A population dynamics simulation of a toroidal ocean, using multi–threading and high-intensive CPU usage, combined with the process explorer of the system to teach preemption and multitasking.
Cyber-Espionage Malware Attacks Detection and Analysis: A Case Study
Published in Journal of Computer Information Systems, 2022
Also, the authors in17 represent some security vulnerabilities such as detecting the existence of malware analysis tools (i.e., by monitoring debuggers and signatures created by the tools and changing the working system). On the other hand, dynamic analysis methods require special tools to monitor suspicious file activity. Thus, there are several tools to be designed to extract properties for dynamic analysis such as Process Monitor,18 Process Explorer,19 TDIMon,20 RegMon, and Wireshark.
Comparison of Erlang/OTP and JADE implementations for standby redundancy in a holonic controller
Published in International Journal of Computer Integrated Manufacturing, 2019
G. T. Hawkridge, A. H. Basson, K. Kruger
The computational requirements of the two standby redundancy implementations are presented here. The computational requirements were evaluated through the normal operation experiment since this is the predominant state in which a standby-redundant system operates. The computational resource requirements were measured using Windows Sysinternal’s Process Explorer for the Microsoft Windows devices and a custom script based on the top command for the embedded Linux devices.