Across
- 4. Analysis that runs malware to observe its actions.
- 7. Tool/framework for analyzing memory dumps.
- 9. Volatile storage analyzed during forensic investigations.
- 13. Scientific investigation of digital evidence.
- 15. Collection of scripts/tools to aid memory analysis.
Down
- 1. Processes or data intentionally concealed by attackers.
- 2. Assigning identifiers or categories to malicious code.
- 3. Analysis that observes behavior without executing malware.
- 5. Decoy system designed to attract and study attackers.
- 6. Malicious software analyzed in automated systems.
- 8. Set of tools or methods used in forensic analysis.
- 10. Copying physical memory for analysis.
- 11. Person performing memory or malware analysis.
- 12. Running program or task, sometimes hidden by malware.
- 14. Analysis performed by a system without human intervention.
