Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 3.014 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
3.014
Dung lượng
7,71 MB
Nội dung
[...]... About the Author Preface Who Should Read This Book What I Cover What I Do Not Cover Acknowledgments Contact Information Part I STRATEGIES OF THE ATTACKER Chapter 1 Introduction to the Games of Nature Section 1.1 Early Models of SelfReplicating Structures Section 1.2 Genesis ofComputer Viruses Section 1.3 Automated Replicating Code: The Theory and Definition ofComputer Viruses References Chapter 2 The. .. index_U index_V index_W index_X index_Y index_Z THE ARTOF COMPUTE DEFENSE By Peter Szor Publisher : Addison Wesley Pub Date : February 03, 200 ISBN : 0-321-30454-3 Pages : 744 Symantec's chief antivirus researcher h contemporary virus threats, defense tec books on computer viruses, The Artof is a reference written strictly for white responsible for protecting their organiza systematically covers everything... n classification, protection strategies, anti much more Table of Contents • Index • Szor presents the state -of -the- art in bo full technical detail that professionals attacks Along the way, he provides ex and other emerging techniques, so you threats Szor also offers the most thorough and publishedaddressing everything from cr automating the analysis process This b Discovering how malicious code Classifying... Chapter 2 The Fascination of Malicious Code Analysis Section 2.1 Common Patterns ofVirusResearch Section 2.2 Antivirus Defense Development Section 2.3 Terminology of Malicious Programs Section 2.4 Other Categories Section 2.5 Computer Malware Naming Scheme Section 2.6 Annotated List of Officially Recognized Platform Names References Chapter 3 Malicious Code Environments Section 3.1 Computer Architecture... DoS (Denial of Service) Attacks 8.7 Data Stealers: Making Money with Viruses 8.8 Conclusion References Chapter 9 Strategies ofComputer Worms 9.1 Introduction 9.2 The Generic Structure ofComputer Worms 9.3 Target Locator 9.4 Infection Propagators 9.5 Common Worm Code Transfer and Execution Techniques 9.6 Update Strategies ofComputer Worms 9.7 Remote Control via Signaling 9.8 Intentional and Accidental... and responding to co polymorphic, and metamorphic Mastering empirical methods for with what you learn Reverse-engineering malicious c emulators, and virtual machines Implementing technical defenses inoculation, integrity checking, sa and much more Using worm blocking, host-base defense strategies THE ARTOF COMPUTE DEFENSE By Peter Szor Publisher : Addison Wesley Pub Date : February 03, 200 Table of. .. DoS (Denial of Service) Attacks Section 8.7 Data Stealers: Making Money with Viruses Section 8.8 Conclusion References Chapter 9 Strategies ofComputer Worms Section 9.1 Introduction Section 9.2 The Generic Structure ofComputer Worms Section 9.3 Target Locator Section 9.4 Infection Propagators Section 9.5 Common Worm Code Transfer and Execution Techniques Section 9.6 Update Strategies ofComputer Worms... Multipartite Viruses Section 3.23 Conclusion References Chapter 4 Classification of Infection Strategies Section 4.1 Boot Viruses Section 4.2 File Infection Techniques Section 4.3 An In-Depth Look at Win32 Viruses Section 4.4 Conclusion References Chapter 5 Classification of In-Memory Strategies Section 5.1 Direct-Action Viruses Section 5.2 Memory-Resident Viruses Section 5.3 Temporary MemoryResident Viruses... Section 6.3 Aggressive Retroviruses References Chapter 7 Advanced Code Evolution Techniques andComputerVirus Generator Kits Section 7.1 Introduction Section 7.2 Evolution of Code Section 7.3 Encrypted Viruses Section 7.4 Oligomorphic Viruses Section 7.5 Polymorphic Viruses Section 7.6 Metamorphic Viruses Section 7.7 Virus Construction Kits References Chapter 8 Classification According to Payload Section... Exploits, Vulnerabilities, and Buffer Overflow Attacks 10.1 Introduction 10.2 Background 10.3 Types of Vulnerabilities 10.4 Current and Previous Threats 10.5 Summary References Part II: STRATEGIES OF THE DEFENDER Chapter 11 Antivirus Defense Techniques 11.1 First-Generation Scanners 11.2 Second-Generation Scanners 11.3 Algorithmic Scanning Methods 11.4 Code Emulation 11.5 Metamorphic Virus Detection Examples .