<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
<mods version="3.3" id="59015">
 <titleInfo>
  <title>Utilizing Reverse Engineering Technique for A Malware Analysis Model</title>
 </titleInfo>
 <name type="Personal Name" authority="">
  <namePart>Amiruddin</namePart>
  <role>
   <roleTerm type="text">Primary Author</roleTerm>
  </role>
 </name>
 <typeOfResource manuscript="no" collection="yes">mixed material</typeOfResource>
 <genre authority="marcgt">bibliography</genre>
 <originInfo>
  <place>
   <placeTerm type="text">Semarang</placeTerm>
   <publisher>Universitas Negeri Semarang</publisher>
   <dateIssued>2021</dateIssued>
  </place>
 </originInfo>
 <language>
  <languageTerm type="code">e</languageTerm>
  <languageTerm type="text">English</languageTerm>
 </language>
 <physicalDescription>
  <form authority="gmd">Artikel Jurnal</form>
  <extent>hlm : 222-229</extent>
 </physicalDescription>
 <relatedItem type="series">
  <titleInfo/>
  <title>Scientific Journal of Informatics</title>
 </relatedItem>
</mods>
<note>&#13;
Abstract&#13;
Purpose: Malicious software or malware is a real threat to the security of computer systems or networks. Researchers made various attempts to find information and knowledge about malware, including preventing or even eliminating it. One effort to detect it is using a malware dynamic analysis model based on reverse engineering techniques. However, there are many reverse engineering techniques proposed with various stages and requirements in the literature. Methods: This research uses an experimental method. The object of research is a malware analysis model using reverse engineering techniques. The experimental method used is qualitative, collecting data related to the advantages and disadvantages of the reverse engineering-based malware analysis models used as a reference in this study. The data is used as consideration to propose a new model of malware analysis utilizing reverse engineering techniques. Result: In this study an analysis model of malware was proposed by synthesizing several reverse engineering-based malware analysis models. Novelty: The proposed model was then tested in a virtual environment where it is proven to be more effective than previous models for analyzing malware.&#13;
</note>
<note type="statement of responsibility"></note>
<subject authority="">
 <topic>Informatika</topic>
</subject>
<classification>SJI</classification>
<identifier type="isbn">24077658</identifier>
<location>
 <physicalLocation>Perpustakaan Teknik UPI YAI </physicalLocation>
 <shelfLocator>SJI V8N2 November 2021</shelfLocator>
 <holdingSimple>
  <copyInformation>
   <numerationAndChronology type="1">SJI4a-006</numerationAndChronology>
   <sublocation>Perpustakaan FT UPI YAI</sublocation>
   <shelfLocator>SJI V8N2 November 2021</shelfLocator>
  </copyInformation>
  <copyInformation>
   <numerationAndChronology type="1">SJI4b-006</numerationAndChronology>
   <sublocation>Perpustakaan FT UPI YAI</sublocation>
   <shelfLocator>SJI V8N2 November 2021</shelfLocator>
  </copyInformation>
 </holdingSimple>
</location>
<slims:image>SJI_V8N2_November_2021.jpg.jpg</slims:image>
<recordInfo>
 <recordIdentifier>59015</recordIdentifier>
 <recordCreationDate encoding="w3cdtf">2023-02-13 09:15:14</recordCreationDate>
 <recordChangeDate encoding="w3cdtf">2023-02-13 09:15:14</recordChangeDate>
 <recordOrigin>machine generated</recordOrigin>
</recordInfo>
</modsCollection>