Sandboxed malware analysis tools allow security analysts to derive insights about malware files by running them in an isolated environment. With that, security analysts don't
have to spend time securing the runtime environment. Furthermore, such tools are able to automatically create reports about the malwares behavior .
However, currently available tools are either closed-source , unmaintained  or complex to setup and operate . Remote access and the ability to provide extensive network
analysis are only provided in a limited way.
Thus, this thesis is concerned with the design, implementation and evaluation of a light-weight sandbox for automated malware analysis. As a first step towards generating
insights about a malware's behavior, SecBox can be integrated with the traffic analysis platform SecGrid .
Supervisors: Jan von der Assenback to the main page