My Account Log in

1 option

Defending Cyber Systems through Reverse Engineering of Criminal Malware / by Marwan Omar.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Author/Creator:
Omar, Marwan., Author.
Contributor:
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
SpringerBriefs in computer science 2191-5776
SpringerBriefs in Computer Science, 2191-5776
Language:
English
Subjects (All):
Data protection.
Computer crimes.
Data and Information Security.
Cybercrime.
Computer Crime.
Local Subjects:
Data and Information Security.
Cybercrime.
Computer Crime.
Physical Description:
1 online resource (VIII, 54 pages) : 38 illustrations
Edition:
1st ed. 2022.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2022.
System Details:
text file PDF
Summary:
This SpringerBrief discusses underlying principles of malware reverse engineering and introduces the major techniques and tools needed to effectively analyze malware that targets business organizations. It also covers the examination of real-world malware samples, which illustrates the knowledge and skills necessary to take control of cyberattacks. This SpringerBrief explores key tools and techniques to learn the main elements of malware analysis from the inside out. It also presents malware reverse engineering using several methodical phases, in order to gain a window into the mind set of hackers. Furthermore, this brief examines malicious program's behavior and views its code-level patterns. Real world malware specimens are used to demonstrate the emerging behavioral patterns of battlefield malware as well. This SpringerBrief is unique, because it demonstrates the capabilities of emerging malware by conducting reverse-code engineering on real malware samples and conducting behavioral analysis in isolated lab system. Specifically, the author focuses on analyzing malicious Windows executables. This type of malware poses a large threat to modern enterprises. Attackers often deploy malicious documents and browser-based exploits to attack Windows enterprise environment. Readers learn how to take malware inside-out using static properties analysis, behavioral analysis and code-level analysis techniques. The primary audience for this SpringerBrief is undergraduate students studying cybersecurity and researchers working in this field. Cyber security professionals that desire to learn more about malware analysis tools and techniques will also want to purchase this SpringerBrief.
Contents:
Introduction to The Fascinating World of Malware Analysis
Static Analysis of Malware
Behavioral Analysis Principles
Principles of Code-level Analysis.
Other Format:
Printed edition:
ISBN:
978-3-031-11626-1
9783031116261
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account