Identifying Malicious Code Through Reverse Engineering

Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world. Identifying Malicious Code through Reverse Engineering provides information on reverse...

Full description

Bibliographic Details
Other Authors: Singh, Abhishek (Editor)
Format: eBook
Language:English
Published: New York, NY Springer US 2009, 2009
Edition:1st ed. 2009
Series:Advances in Information Security
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 02551nmm a2200421 u 4500
001 EB000357030
003 EBX01000000000000000210082
005 00000000000000.0
007 cr|||||||||||||||||||||
008 130626 ||| eng
020 |a 9780387894683 
100 1 |a Singh, Abhishek  |e [editor] 
245 0 0 |a Identifying Malicious Code Through Reverse Engineering  |h Elektronische Ressource  |c edited by Abhishek Singh 
250 |a 1st ed. 2009 
260 |a New York, NY  |b Springer US  |c 2009, 2009 
300 |a X, 188 p. 20 illus  |b online resource 
505 0 |a Assembly Language -- Fundamental of Windows -- Portable Executable File Format -- Reversing Binaries for Identification of Vulnerabilities -- Fundamental of Reverse Engineering 
653 |a Computer Communication Networks 
653 |a Cryptography 
653 |a Data Structures and Information Theory 
653 |a Application software 
653 |a Computer networks  
653 |a Information theory 
653 |a Data protection 
653 |a Data encryption (Computer science) 
653 |a Telecommunication 
653 |a Data structures (Computer science) 
653 |a Communications Engineering, Networks 
653 |a Cryptology 
653 |a Computer and Information Systems Applications 
653 |a Data and Information Security 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Advances in Information Security 
028 5 0 |a 10.1007/978-0-387-89468-3 
856 4 0 |u https://doi.org/10.1007/978-0-387-89468-3?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world. Identifying Malicious Code through Reverse Engineering provides information on reverse engineering and concepts that can be used to identify the malicious patterns in vulnerable software. The malicious patterns are used to develop signatures to prevent vulnerability and block worms or viruses. This book also includes the latest exploits through various case studies. Identifying Malicious Code through Reverse Engineering is designed for professionals composed of practitioners and researchers writing signatures to prevent virus and software vulnerabilities. This book is also suitable for advanced-level students in computer science and engineering studying information security, as a secondary textbook or reference