dc.contributor.advisor | Xenakis, Christos | |
dc.contributor.advisor | Ξενάκης, Χρήστος | |
dc.contributor.author | Dervisis, Ioannis | |
dc.contributor.author | Δερβίσης, Ιωάννης | |
dc.date.accessioned | 2021-10-11T06:34:55Z | |
dc.date.available | 2021-10-11T06:34:55Z | |
dc.date.issued | 2021-03-03 | |
dc.identifier.uri | https://dione.lib.unipi.gr/xmlui/handle/unipi/13735 | |
dc.identifier.uri | http://dx.doi.org/10.26267/unipi_dione/1158 | |
dc.format.extent | 133 | el |
dc.language.iso | en | el |
dc.publisher | Πανεπιστήμιο Πειραιώς | el |
dc.rights | Αναφορά Δημιουργού - Παρόμοια Διανομή 3.0 Ελλάδα | * |
dc.rights.uri | http://creativecommons.org/licenses/by-sa/3.0/gr/ | * |
dc.title | Linux malware analysis | el |
dc.title.alternative | Ανάλυση κακόβουλου λογισμικού σε "Linux" περιβάλλον | el |
dc.type | Master Thesis | el |
dc.contributor.department | Σχολή Τεχνολογιών Πληροφορικής και Επικοινωνιών. Τμήμα Ψηφιακών Συστημάτων | el |
dc.description.abstractEN | The scope of this thesis is the study of Malware Analysis on Linux environments in a systematic and detailed manner, based on SAMA methodology. Moreover, the ENISA guidelines were advised for creating a modular laboratory, capable of isolating the infected VMs and providing them with Internet connection or a simulated one by applying the appropriate rules. A variant of “Skidmap” cryptomining trojan was selected as the sample to be analyzed and extensive effort was given in reversing its code as well as studying its behavior to fully understand the intentions. Beyond its core functionality are findings such as the communication means, the servers used to deploy their next stage, the evasive techniques, and the way that those were bypassed. | el |
dc.contributor.master | Ασφάλεια Ψηφιακών Συστημάτων | el |
dc.subject.keyword | Skidmap | el |
dc.subject.keyword | SAMA | el |
dc.subject.keyword | Linux | el |
dc.date.defense | 2021-05-20 | |