Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Eoghan Casey is active.

Publication


Featured researches published by Eoghan Casey.


Malware Forensics Field Guide for Windows Systems | 2012

Analysis of a Malware Specimen

Cameron H. Malin; Eoghan Casey; James M. Aquilina

Through the file profiling method, tools, and techniques discussed in Chapter 5, forensic investigators can gain important insight into the dependencies, strings, antivirus signatures, and metadata associated with a suspect file and use this knowledge to learn more about the file. Building on that information, this chapter further explores the nature, purpose, and functionality of a suspect program by conducting a dynamic and static analysis of the binary. The chapter demonstrates the importance of using dynamic and static analysis to gain a better understanding of a malicious code specimen. It explains what an investigator should consider while analyzing a suspect program, including the nature and purpose of the program, how it accomplishes its purpose, how it interacts with the host system and network, how the attacker interacts with the program, and more. The chapter also covers how phylogenetic relationships between specimens can provide insight into their origin, composition, and development.


Archive | 2008

File Identification and Profiling

Cameron H. Malin; Eoghan Casey; James M. Aquilina

This chapter introduces Windows-based file profiling analysis through an incident response scenario. During the course of responding to or investigating an incident encountered on a system within a targeted network, or clearly linked to receipt by a network user via email, instant messaging, or other means of online communication or file transfer, a suspicious file may be fairly characterized as: of unknown origin, unfamiliar, or seemingly familiar, but located in an unusual place on the system. After extracting the suspicious file from the system, determining its purpose and functionality is often a good starting place. This process is called file profiling. The file profiling process entails an initial or cursory static analysis of the suspect code. Static analysis is the process of analyzing executable binary code without actually executing the file. Dynamic or behavioral analysis involves executing the code and monitoring its behavior, including its interaction and effect on the host system. These are the two approaches to code analysis that most digital investigators implement.


Archive | 2008

Malware Forensics: Investigating and Analyzing Malicious Code

Cameron H. Malin; Eoghan Casey; James M. Aquilina


Archive | 2012

Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides

Cameron H. Malin; Eoghan Casey; James M. Aquilina


Archive | 2014

Linux Memory Forensics

Cameron H. Malin; Eoghan Casey; James M. Aquilina


Malware Forensics Field Guide for Windows Systems | 2012

Introduction to Malware Forensics

Cameron H. Malin; Eoghan Casey; James M. Aquilina


Malware Forensics Field Guide for Linux Systems | 2014

Chapter 4 – Legal Considerations

Cameron H. Malin; Eoghan Casey


Malware Forensics Field Guide for Linux Systems | 2014

Chapter 1 – Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System

Cameron H. Malin; Eoghan Casey


Malware Forensics Field Guide for Linux Systems | 2014

Chapter 5 – File Identification and Profiling: Initial Analysis of a Suspect File on a Linux System

Cameron H. Malin; Eoghan Casey


Malware Forensics Field Guide for Linux Systems | 2014

Chapter 3 – Postmortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Linux Systems

Cameron H. Malin; Eoghan Casey

Collaboration


Dive into the Eoghan Casey's collaboration.

Top Co-Authors

Avatar

Cameron H. Malin

Federal Bureau of Investigation

View shared research outputs
Researchain Logo
Decentralizing Knowledge