// Comparison

Practical Malware Analysis vs Practical Reverse Engineering: Which Should You Read?

Two cybersecurity books on Malware, compared honestly: who each is for, what each does best, and which to read first.

Intermediate
5/52012
Practical Malware Analysis

The Hands-On Guide to Dissecting Malicious Software

Michael Sikorski, Andrew Honig

Still the gold standard textbook for static and dynamic malware analysis on Windows.

Advanced
4/52014
Practical Reverse Engineering

x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

Bruce Dang, Alexandre Gazet, Elias Bachaalany

A working reverser's textbook from three Microsoft / Quarkslab veterans, covering the architectures and toolchain you'll actually meet on real targets, including the Windows kernel and modern obfuscation patterns.

Read this if

Aspiring threat researchers, blue-teamers who want to read samples instead of forwarding them to a vendor, anyone preparing for GREM.
Reverse engineers transitioning from "I can read disassembly" to "I can audit a Windows kernel driver." The architecture-first companion to Practical Malware Analysis.

Skip this if

Mac/Linux malware, mobile, or modern packed loaders that defeat IDA's autoanalysis. The book is x86 Windows in spirit.
Beginners with no assembly background, or readers focused exclusively on Linux/userland. The book is heavy on Windows internals and assumes you'll do the exercises in WinDbg.

Key takeaways

  • Static and dynamic analysis are two halves of one workflow, not alternatives.
  • The labs are the book, the chapters are scaffolding to make the labs solvable.
  • Anti-analysis techniques deserve more time than newcomers usually give them.
  • x86, x64, ARM, kernel-mode debugging, and anti-RE techniques in a single coherent volume; nothing else competes for breadth.
  • The kernel debugging chapters are the practical introduction the official Windows Internals book never quite delivers for security audiences.
  • Anti-RE coverage (obfuscation, packing, anti-debug, virtualization-based protection) is the bridge to modern malware analysis that PMA consciously skips.

How they compare

We rate Practical Malware Analysis higher (5/5 against 4/5 for Practical Reverse Engineering). For most readers, that means Practical Malware Analysis is the primary pick and Practical Reverse Engineering is a useful follow-up.

Practical Malware Analysis is pitched at intermediate level. Practical Reverse Engineering is pitched at advanced level. Read the easier one first if you're not yet comfortable with the topic.

Practical Malware Analysis and Practical Reverse Engineering both cover Malware, Reverse Engineering, so reading them in sequence reinforces the same material from different angles.

Keep reading

Related topics