Defending Cyber Systems through Reverse Engineering of Criminal Malware
Seiten
2022
|
1st ed. 2022
Springer International Publishing (Verlag)
978-3-031-11625-4 (ISBN)
Springer International Publishing (Verlag)
978-3-031-11625-4 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
This SpringerBrief discusses underlying principles of malware reverse engineering and introduces the major techniques and tools needed to effectively analyze malware that targets business organizations. It also covers the examination of real-world malware samples, which illustrates the knowledge and skills necessary to take control of cyberattacks.
This SpringerBrief explores key tools and techniques to learn the main elements of malware analysis from the inside out. It also presents malware reverse engineering using several methodical phases, in order to gain a window into the mind set of hackers. Furthermore, this brief examines malicious program's behavior and views its code-level patterns. Real world malware specimens are used to demonstrate the emerging behavioral patterns of battlefield malware as well.
This SpringerBrief is unique, because it demonstrates the capabilities of emerging malware by conducting reverse-code engineering on real malware samples and conducting behavioral analysis in isolated lab system. Specifically, the author focuses on analyzing malicious Windows executables. This type of malware poses a large threat to modern enterprises. Attackers often deploy malicious documents and browser-based exploits to attack Windows enterprise environment. Readers learn how to take malware inside-out using static properties analysis, behavioral analysis and code-level analysis techniques.
The primary audience for this SpringerBrief is undergraduate students studying cybersecurity and researchers working in this field. Cyber security professionals that desire to learn more about malware analysis tools and techniques will also want to purchase this SpringerBrief.
This SpringerBrief explores key tools and techniques to learn the main elements of malware analysis from the inside out. It also presents malware reverse engineering using several methodical phases, in order to gain a window into the mind set of hackers. Furthermore, this brief examines malicious program's behavior and views its code-level patterns. Real world malware specimens are used to demonstrate the emerging behavioral patterns of battlefield malware as well.
This SpringerBrief is unique, because it demonstrates the capabilities of emerging malware by conducting reverse-code engineering on real malware samples and conducting behavioral analysis in isolated lab system. Specifically, the author focuses on analyzing malicious Windows executables. This type of malware poses a large threat to modern enterprises. Attackers often deploy malicious documents and browser-based exploits to attack Windows enterprise environment. Readers learn how to take malware inside-out using static properties analysis, behavioral analysis and code-level analysis techniques.
The primary audience for this SpringerBrief is undergraduate students studying cybersecurity and researchers working in this field. Cyber security professionals that desire to learn more about malware analysis tools and techniques will also want to purchase this SpringerBrief.
Dr. Marwan Omar is an Associate Professor of Cybersecurity at Saint Leo Community since 2015. Dr. Omar received a Master's degree in Information Systems and Technology from the University of Phoenix, 2009 and a Doctorate Degree in Digital Systems Security from Colorado Technical University, 2012. Dr. Omar recently earned a Post-Doctoral certificate from the University of Fernando Pesoa, Portugal and holds numerous industry certifications including CEH, Sec+, GASF, and CDPSE, among others.
Introduction to The Fascinating World of Malware Analysis.- Static Analysis of Malware.- Behavioral Analysis Principles.- Principles of Code-level Analysis.
Erscheinungsdatum | 01.09.2022 |
---|---|
Reihe/Serie | SpringerBriefs in Computer Science |
Zusatzinfo | VIII, 54 p. 38 illus. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 105 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Recht / Steuern ► Strafrecht ► Besonderes Strafrecht | |
Recht / Steuern ► Strafrecht ► Kriminologie | |
Schlagworte | API monitor • Automated malware analysis • Behavioral analysis • Code-level analysis • Command and control capabilities • Dynamic Analysis • malware analysis • PE headers • Reverse-engineering malware • Static Analysis • Wireshark • x64 debugger |
ISBN-10 | 3-031-11625-9 / 3031116259 |
ISBN-13 | 978-3-031-11625-4 / 9783031116254 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …
Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99 €
Management der Informationssicherheit und Vorbereitung auf die …
Buch (2024)
Carl Hanser (Verlag)
69,99 €