1. Trang chủ
  2. » Công Nghệ Thông Tin

Tài liệu The Art of Computer Virus Research and Defense pptx

3K 656 3

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 3.014
Dung lượng 7,71 MB

Nội dung

[...]... About the Author Preface Who Should Read This Book What I Cover What I Do Not Cover Acknowledgments Contact Information Part I STRATEGIES OF THE ATTACKER Chapter 1 Introduction to the Games of Nature Section 1.1 Early Models of SelfReplicating Structures Section 1.2 Genesis of Computer Viruses Section 1.3 Automated Replicating Code: The Theory and Definition of Computer Viruses References Chapter 2 The. .. index_U index_V index_W index_X index_Y index_Z THE ART OF COMPUTE DEFENSE By Peter Szor Publisher : Addison Wesley Pub Date : February 03, 200 ISBN : 0-321-30454-3 Pages : 744 Symantec's chief antivirus researcher h contemporary virus threats, defense tec books on computer viruses, The Art of is a reference written strictly for white responsible for protecting their organiza systematically covers everything... n classification, protection strategies, anti much more Table of Contents • Index • Szor presents the state -of -the- art in bo full technical detail that professionals attacks Along the way, he provides ex and other emerging techniques, so you threats Szor also offers the most thorough and published​addressing everything from cr automating the analysis process This b Discovering how malicious code Classifying... Chapter 2 The Fascination of Malicious Code Analysis Section 2.1 Common Patterns of Virus Research Section 2.2 Antivirus Defense Development Section 2.3 Terminology of Malicious Programs Section 2.4 Other Categories Section 2.5 Computer Malware Naming Scheme Section 2.6 Annotated List of Officially Recognized Platform Names References Chapter 3 Malicious Code Environments Section 3.1 Computer Architecture... DoS (Denial of Service) Attacks 8.7 Data Stealers: Making Money with Viruses 8.8 Conclusion References Chapter 9 Strategies of Computer Worms 9.1 Introduction 9.2 The Generic Structure of Computer Worms 9.3 Target Locator 9.4 Infection Propagators 9.5 Common Worm Code Transfer and Execution Techniques 9.6 Update Strategies of Computer Worms 9.7 Remote Control via Signaling 9.8 Intentional and Accidental... and responding to co polymorphic, and metamorphic Mastering empirical methods for with what you learn Reverse-engineering malicious c emulators, and virtual machines Implementing technical defenses inoculation, integrity checking, sa and much more Using worm blocking, host-base defense strategies THE ART OF COMPUTE DEFENSE By Peter Szor Publisher : Addison Wesley Pub Date : February 03, 200 Table of. .. DoS (Denial of Service) Attacks Section 8.7 Data Stealers: Making Money with Viruses Section 8.8 Conclusion References Chapter 9 Strategies of Computer Worms Section 9.1 Introduction Section 9.2 The Generic Structure of Computer Worms Section 9.3 Target Locator Section 9.4 Infection Propagators Section 9.5 Common Worm Code Transfer and Execution Techniques Section 9.6 Update Strategies of Computer Worms... Multipartite Viruses Section 3.23 Conclusion References Chapter 4 Classification of Infection Strategies Section 4.1 Boot Viruses Section 4.2 File Infection Techniques Section 4.3 An In-Depth Look at Win32 Viruses Section 4.4 Conclusion References Chapter 5 Classification of In-Memory Strategies Section 5.1 Direct-Action Viruses Section 5.2 Memory-Resident Viruses Section 5.3 Temporary MemoryResident Viruses... Section 6.3 Aggressive Retroviruses References Chapter 7 Advanced Code Evolution Techniques and Computer Virus Generator Kits Section 7.1 Introduction Section 7.2 Evolution of Code Section 7.3 Encrypted Viruses Section 7.4 Oligomorphic Viruses Section 7.5 Polymorphic Viruses Section 7.6 Metamorphic Viruses Section 7.7 Virus Construction Kits References Chapter 8 Classification According to Payload Section... Exploits, Vulnerabilities, and Buffer Overflow Attacks 10.1 Introduction 10.2 Background 10.3 Types of Vulnerabilities 10.4 Current and Previous Threats 10.5 Summary References Part II: STRATEGIES OF THE DEFENDER Chapter 11 Antivirus Defense Techniques 11.1 First-Generation Scanners 11.2 Second-Generation Scanners 11.3 Algorithmic Scanning Methods 11.4 Code Emulation 11.5 Metamorphic Virus Detection Examples .

Ngày đăng: 17/02/2014, 15:20

TỪ KHÓA LIÊN QUAN