Malware has really acquired a gigantic proportion of all pervasive security risk and most of the anti-virus solution has no ability to detect them at all. Considering the wide spread prevalence and severity of damage capability makes us wary and forces us to devise a ways and means of containing them. Secure Matrix understand the risk of Malware and ready to propagate industry held secret for knowledge dissemination in this critical area of cyber risk using academician, researchers & engineering students. Knowing how to analyse malware has become a critical skill for security incident responders and digital forensic investigators. Understanding the inner-workings of malicious code and the way malware on the infected system helps in deriving the indicators of compromise to locate malicious artefacts throughout the organizations. The process also allows security professionals to assess the scope, severity andrepercussionsof the incident, and may help the organization bring the parties responsible for the incident to justice. To start with the Foundation shall help build critical skill sets for malware reverse engineering and work along with academician, researches and student on following area to start with:

  • 1. Malware analysis lab deployment in Engineering institution
  • 2. Assembling the toolkit for malware forensics
  • 3. Performing behavioural analysis of malicious Windows executable
  • 4. Performing static and dynamic code analysis of malicious Windows executable
  • 5. Behavioural Malware Analysis Dynamic Malware Analysis (using a debugger)
  • 6. Static Malware Analysis (using a disassembler) JavaScript De-obfuscation
  • 7. PDF Document Analysis Office Document Analysis Memory Analysis
  • 8. Analysing malicious Microsoft Office (Word, Excel, PowerPoint) and Adobe PDF documents
  • 9. Examining shellcode in the context of malicious files
  • 10. Analysing memory to assess malware characteristics and reconstruct infection artefacts
  • 11. Using memory forensics to analyse rootkit infections
  • 12. Handling anti-disassembling techniques
  • 13. Identifying key x86 assembly logic structures with a disassembler
  • 14. Patterns of common malware characteristics at the Windows API level (DLL injection, hooking, keylogging, sniffing, etc.)
  • 15. Developing native product for Malware Detection & Analysis