000 | 02875nam a22005535i 4500 | ||
---|---|---|---|
001 | 978-1-4614-5523-3 | ||
003 | DE-He213 | ||
005 | 20200421111202.0 | ||
007 | cr nn 008mamaa | ||
008 | 120913s2013 xxu| s |||| 0|eng d | ||
020 |
_a9781461455233 _9978-1-4614-5523-3 |
||
024 | 7 |
_a10.1007/978-1-4614-5523-3 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aYin, Heng. _eauthor. |
|
245 | 1 | 0 |
_aAutomatic Malware Analysis _h[electronic resource] : _bAn Emulator Based Approach / _cby Heng Yin, Dawn Song. |
264 | 1 |
_aNew York, NY : _bSpringer New York : _bImprint: Springer, _c2013. |
|
300 |
_aIX, 73 p. 15 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSpringerBriefs in Computer Science, _x2191-5768 |
|
505 | 0 | _aIntroduction -- Dynamic Binary Analysis Platform -- Hidden Code Extraction -- Privacy-breaching Behavior Analysis -- Hooking Behavior Analysis -- Analysis of Trigger Conditions and Hidden Behaviors -- Concluding Remarks. | |
520 | _aMalicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware analysis and defense systems. Automatic Malware Analysis presents a virtualized malware analysis framework that addresses common challenges in malware analysis. In regards to this new analysis framework, a series of analysis techniques for automatic malware analysis is developed. These techniques capture intrinsic characteristics of malware, and are well suited for dealing with new malware samples and attack mechanisms. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aData structures (Computer science). | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aComputers. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aData Structures, Cryptology and Information Theory. |
650 | 2 | 4 | _aInformation Systems and Communication Service. |
650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
700 | 1 |
_aSong, Dawn. _eauthor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9781461455226 |
830 | 0 |
_aSpringerBriefs in Computer Science, _x2191-5768 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-1-4614-5523-3 |
912 | _aZDB-2-SCS | ||
942 | _cEBK | ||
999 |
_c53872 _d53872 |