Takaisinmallinnus keinona haittaohjelmien analysoinnissa

Tässä tutkielmassa käsitellään takaisinmallinnusta ja sen hyödyntämistä haittaohjelmien analysoinnissa. Haittaohjelmat ovat hyvin yleisiä ja takaisinmallinnus vastaavasti tunnettu keino analysoida niitä. Tavoitteena on perehtyä syvällisemmin takaisinmallinnukseen sekä selventää, miten ohjelmia takai...

Full description

Bibliographic Details
Main Author: Vainio, Laura
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Bachelor's thesis
Language:fin
Published: 2022
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/80961
_version_ 1828193201491542016
author Vainio, Laura
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Vainio, Laura Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Vainio, Laura Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Vainio, Laura
datasource_str_mv jyx
description Tässä tutkielmassa käsitellään takaisinmallinnusta ja sen hyödyntämistä haittaohjelmien analysoinnissa. Haittaohjelmat ovat hyvin yleisiä ja takaisinmallinnus vastaavasti tunnettu keino analysoida niitä. Tavoitteena on perehtyä syvällisemmin takaisinmallinnukseen sekä selventää, miten ohjelmia takaisinmallinnetaan ja mitä mahdollisia haasteita sen käyttöön liittyy analysoinnin parissa. This bachelor thesis studies reverse-engineering and its use in malware analysis. Malware programs are common and reverse-engineering is a well-known tool for analyzing them. The main objective is to obtain a more in-depth understanding of reverse-engineering and clarify possible challenges related to reverse-engineering when it is used to analyse malware.
first_indexed 2022-05-10T20:00:25Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Saksa, Tytti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Vainio, Laura", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2022-05-10T06:05:30Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2022-05-10T06:05:30Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2022", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/80961", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 tutkielmassa k\u00e4sitell\u00e4\u00e4n takaisinmallinnusta ja sen hy\u00f6dynt\u00e4mist\u00e4 haittaohjelmien analysoinnissa. Haittaohjelmat ovat hyvin yleisi\u00e4 ja takaisinmallinnus vastaavasti tunnettu keino analysoida niit\u00e4. Tavoitteena on perehty\u00e4 syv\u00e4llisemmin takaisinmallinnukseen sek\u00e4 selvent\u00e4\u00e4, miten ohjelmia takaisinmallinnetaan ja mit\u00e4 mahdollisia haasteita sen k\u00e4ytt\u00f6\u00f6n liittyy analysoinnin parissa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This bachelor thesis studies reverse-engineering and its use in malware analysis. Malware programs are common and reverse-engineering is a well-known tool for analyzing them. The main objective is to obtain a more in-depth understanding of reverse-engineering and clarify possible challenges related to reverse-engineering when it is used to analyse malware.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2022-05-10T06:05:30Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2022-05-10T06:05:30Z (GMT). No. of bitstreams: 0\n Previous issue date: 2022", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "18", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Takaisinmallinnus keinona haittaohjelmien analysoinnissa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202205102612", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "haittaohjelmat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "analyysi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "takaisinmallinnus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_80961
language fin
last_indexed 2025-03-31T20:01:33Z
main_date 2022-01-01T00:00:00Z
main_date_str 2022
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/38dc7c06-0766-4955-b72e-9075248ab17c\/download","text":"URN:NBN:fi:jyu-202205102612.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2022
record_format qdc
source_str_mv jyx
spellingShingle Vainio, Laura Takaisinmallinnus keinona haittaohjelmien analysoinnissa Tietotekniikka Mathematical Information Technology 602 haittaohjelmat analyysi takaisinmallinnus tietoturva
title Takaisinmallinnus keinona haittaohjelmien analysoinnissa
title_full Takaisinmallinnus keinona haittaohjelmien analysoinnissa
title_fullStr Takaisinmallinnus keinona haittaohjelmien analysoinnissa Takaisinmallinnus keinona haittaohjelmien analysoinnissa
title_full_unstemmed Takaisinmallinnus keinona haittaohjelmien analysoinnissa Takaisinmallinnus keinona haittaohjelmien analysoinnissa
title_short Takaisinmallinnus keinona haittaohjelmien analysoinnissa
title_sort takaisinmallinnus keinona haittaohjelmien analysoinnissa
title_txtP Takaisinmallinnus keinona haittaohjelmien analysoinnissa
topic Tietotekniikka Mathematical Information Technology 602 haittaohjelmat analyysi takaisinmallinnus tietoturva
topic_facet 602 Mathematical Information Technology Tietotekniikka analyysi haittaohjelmat takaisinmallinnus tietoturva
url https://jyx.jyu.fi/handle/123456789/80961 http://www.urn.fi/URN:NBN:fi:jyu-202205102612
work_keys_str_mv AT vainiolaura takaisinmallinnuskeinonahaittaohjelmienanalysoinnissa