Haittaohjelmat ja niiden analyysi

This master’s thesis is a study of malware and methods and tools used in their analysis in a 32-bit Windows environment. The methods vary from simple observations to deeper static and dynamic analysis in assembly language. In the practical we use these tools and methods to dissect a real world ma...

Full description

Bibliographic Details
Main Author: Karppinen, Tomi
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Tietotekniikan laitos, Department of Mathematical Information Technology, University of Jyväskylä, Jyväskylän yliopisto
Format: Master's thesis
Language:fin
Published: 2014
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/43832
_version_ 1828193118840684544
author Karppinen, Tomi
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Tietotekniikan laitos Department of Mathematical Information Technology University of Jyväskylä Jyväskylän yliopisto
author_facet Karppinen, Tomi Informaatioteknologian tiedekunta Faculty of Information Technology Tietotekniikan laitos Department of Mathematical Information Technology University of Jyväskylä Jyväskylän yliopisto Karppinen, Tomi Informaatioteknologian tiedekunta Faculty of Information Technology Tietotekniikan laitos Department of Mathematical Information Technology University of Jyväskylä Jyväskylän yliopisto
author_sort Karppinen, Tomi
datasource_str_mv jyx
description This master’s thesis is a study of malware and methods and tools used in their analysis in a 32-bit Windows environment. The methods vary from simple observations to deeper static and dynamic analysis in assembly language. In the practical we use these tools and methods to dissect a real world malware sample.
first_indexed 2023-03-22T09:57:43Z
format Pro gradu
free_online_boolean 1
fullrecord [{"key": "dc.contributor.author", "value": "Karppinen, Tomi", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2014-06-24T10:40:06Z", "language": "", "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2014-06-24T10:40:06Z", "language": "", "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2014", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.other", "value": "oai:jykdok.linneanet.fi:1438010", "language": null, "element": "identifier", "qualifier": "other", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/43832", "language": "", "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This master\u2019s thesis is a study of malware and methods and tools used in their\r\nanalysis in a 32-bit Windows environment. The methods vary from simple observations to\r\ndeeper static and dynamic analysis in assembly language. In the practical we use these tools\r\nand methods to dissect a real world malware sample.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Tomi Karppinen (tojukarp) on 2014-06-24 10:40:05.292263. Form: Master's Thesis publishing form (1 author) (https://kirjasto.jyu.fi/publish-and-buy/publishing-forms/masters-thesis-publishing-form-1-author). JyX data:", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija@noreply.fi) on 2014-06-24T10:40:06Z\r\nNo. of bitstreams: 2\r\nURN:NBN:fi:jyu-201406242136.pdf: 5123466 bytes, checksum: cba994dd1b392cc7d8918ba7e259e6c7 (MD5)\r\nlicense.html: 4236 bytes, checksum: 2730aaffd259d7ec72e43acdafd8f3ee (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2014-06-24T10:40:06Z (GMT). No. of bitstreams: 2\r\nURN:NBN:fi:jyu-201406242136.pdf: 5123466 bytes, checksum: cba994dd1b392cc7d8918ba7e259e6c7 (MD5)\r\nlicense.html: 4236 bytes, checksum: 2730aaffd259d7ec72e43acdafd8f3ee (MD5)\r\n Previous issue date: 2014", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "1 verkkoaineisto (137 sivua)", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "malware", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "malware analysis", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "static analysis", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "dynamic analysis", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "assembly", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Windows", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "reverse engineering", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Haittaohjelmat ja niiden analyysi", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201406242136", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Tietotekniikan laitos", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Department of Mathematical Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2014-06-24T10:40:06Z", "language": "", "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "haittaohjelmat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Windows", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "assembly-kieli", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "analyysi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
id jyx.123456789_43832
language fin
last_indexed 2025-03-31T20:01:18Z
main_date 2014-01-01T00:00:00Z
main_date_str 2014
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/543ca74e-4af3-4391-892e-bb46f9b53e8e\/download","text":"URN:NBN:fi:jyu-201406242136.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2014
record_format qdc
source_str_mv jyx
spellingShingle Karppinen, Tomi Haittaohjelmat ja niiden analyysi malware malware analysis static analysis dynamic analysis assembly Windows reverse engineering Tietotekniikka Mathematical Information Technology 602 haittaohjelmat assembly-kieli analyysi
title Haittaohjelmat ja niiden analyysi
title_full Haittaohjelmat ja niiden analyysi
title_fullStr Haittaohjelmat ja niiden analyysi Haittaohjelmat ja niiden analyysi
title_full_unstemmed Haittaohjelmat ja niiden analyysi Haittaohjelmat ja niiden analyysi
title_short Haittaohjelmat ja niiden analyysi
title_sort haittaohjelmat ja niiden analyysi
title_txtP Haittaohjelmat ja niiden analyysi
topic malware malware analysis static analysis dynamic analysis assembly Windows reverse engineering Tietotekniikka Mathematical Information Technology 602 haittaohjelmat assembly-kieli analyysi
topic_facet 602 Mathematical Information Technology Tietotekniikka Windows analyysi assembly assembly-kieli dynamic analysis haittaohjelmat malware malware analysis reverse engineering static analysis
url https://jyx.jyu.fi/handle/123456789/43832 http://www.urn.fi/URN:NBN:fi:jyu-201406242136
work_keys_str_mv AT karppinentomi haittaohjelmatjaniidenanalyysi