This document presents a framework for analyzing and comparing dynamic malware analysis tools, essential for security researchers struggling to choose the optimal tool due to diverse implementations. It focuses on two techniques: function call monitoring and information flow tracking, detailing their importance in understanding malware behavior. The paper emphasizes the necessity of automating malware analysis processes to effectively combat the increasing volume of malicious codes encountered by analysts.
Related topics: