Across
- 1. Analysis that observes behavior without executing malware.
- 4. Analysis that runs malware to observe its actions.
- 10. Person performing memory or malware analysis.
- 11. Set of tools or methods used in forensic analysis.
- 12. Collection of scripts/tools to aid memory analysis.
- 13. Assigning identifiers or categories to malicious code.
- 14. Scientific investigation of digital evidence.
Down
- 1. Running program or task, sometimes hidden by malware.
- 2. Volatile storage analyzed during forensic investigations.
- 3. Processes or data intentionally concealed by attackers.
- 5. Copying physical memory for analysis.
- 6. Decoy system designed to attract and study attackers.
- 7. Malicious software analyzed in automated systems.
- 8. Analysis performed by a system without human intervention.
- 9. Tool/framework for analyzing memory dumps.
