Defending Cyber Systems through Reverse Engineering of Criminal Malware Defending Cyber Systems through Reverse Engineering of Criminal Malware
SpringerBriefs in Computer Science

Defending Cyber Systems through Reverse Engineering of Criminal Malware

    • 32,99 €
    • 32,99 €

Beschreibung des Verlags

This SpringerBrief discusses underlying principles of malware reverse engineering and introduces the major techniques and tools needed to effectively analyze malware that targets business organizations. It also covers the examination of real-world malware samples, which illustrates the knowledge and skills necessary to take control of cyberattacks.
This SpringerBrief explores key tools and techniques to learn the main elements of malware analysis from the inside out. It also presents malware reverse engineering using several methodical phases, in order to gain a window into the mind set of hackers. Furthermore, this brief examines malicious program’s behavior and views its code-level patterns. Real world malware specimens are used to demonstrate the emerging behavioral patterns of battlefield malware as well.
This SpringerBrief is unique, because it demonstrates the capabilities of emerging malware by conducting reverse-code engineering on real malware samples and conducting behavioral analysis in isolated lab system. Specifically, the author focuses on analyzing malicious Windows executables. This type of malware poses a large threat to modern enterprises. Attackers often deploy malicious documents and browser-based exploits to attack Windows enterprise environment. Readers learn how to take malware inside-out using static properties analysis, behavioral analysis and code-level analysis techniques.
The primary audience for this SpringerBrief is undergraduate students studying cybersecurity and researchers working in this field. Cyber security professionals that desire to learn more about malware analysis tools and techniques will also want to purchase this SpringerBrief.

GENRE
Computer und Internet
ERSCHIENEN
2022
29. August
SPRACHE
EN
Englisch
UMFANG
62
Seiten
VERLAG
Springer International Publishing
ANBIETERINFO
Springer Science & Business Media LLC
GRÖSSE
16
 MB
Malware Analysis Techniques Malware Analysis Techniques
2021
Malware Intrusion Detection Malware Intrusion Detection
2011
Open Source Software for Digital Forensics Open Source Software for Digital Forensics
2010
Spyware development and analysis Spyware development and analysis
2011
Detection of Intrusions and Malware, and Vulnerability Assessment Detection of Intrusions and Malware, and Vulnerability Assessment
2009
Research in Attacks, Intrusions, and Defenses Research in Attacks, Intrusions, and Defenses
2015
The Amazing Journey of Reason The Amazing Journey of Reason
2019
Manifold Learning Manifold Learning
2024
The Mathematical Theory of Semantic Communication The Mathematical Theory of Semantic Communication
2025
Developing Sustainable and Energy-Efficient Software Systems Developing Sustainable and Energy-Efficient Software Systems
2023
Objective Information Theory Objective Information Theory
2023
Distributed Hash Table Distributed Hash Table
2013