rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780387327204

Malware Detection

by ; ; ; ;
  • ISBN13:

    9780387327204

  • ISBN10:

    0387327207

  • Format: Hardcover
  • Copyright: 2006-12-01
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $329.99 Save up to $215.15
  • Digital
    $248.82*
    Add to Cart

    DURATION
    PRICE
    *To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.

Summary

Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many malicious attacks are achieved by malicious code or malware, such as viruses and worms. Given the deleterious affects of malware on our cyber infrastructure, identifying malicious programs is an important goal. Unfortunately, malware detectors have not kept pace with the evasion techniques commonly used by hackers, i.e., the good guys are falling behind in the arms race.Malware Detection captures the state of the art research in the area of malicious code detection, prevention and mitigation.

Table of Contents

Part I Overview
1 Malware Evolution: A Snapshot of Threats and Countermeasures in 2005
Brian Witten, Carey Nachenberg
3(16)
Part II Software Analysis and Assurance
2 Static Disassembly and Code Analysis
Giovanni Vigna
19(24)
3 A Next-Generation Platform for Analyzing Executables
Thomas Reps, Gogul Balakrishnan, Junghee Lim, Tim Teitelbaum
43(20)
4 Behavioral and Structural Properties of Malicious Code
Christopher Kruegel
63(22)
5 Detection and Prevention of SQL Injection Attacks
William G.J. Halfond, Alessandro Orso
85(28)
Part III Distributed Threat Detection and Defense
6 Very Fast Containment of Scanning Worms, Revisited
Nicholas Weaver, Stuart Staniford, Vern Paxson
113(34)
7 Sting: An End-to-End Self-Healing System for Defending against Internet Worms
David Brumley, James Newsome, Dawn Song
147(24)
8 An Inside Look at Botnets
Paul Barford, Vinod Yegneswaran
171(22)
9 Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy?
Mihai Christodorescu, Shai Rubin
193(20)
Part IV Stealthy and Targeted Threat Detection and Defense
10 Composite Hybrid Techniques For Defending Against Targeted Attacks
Stelios Sidiroglou, Angelos D. Keromytis
213(18)
11 Towards Stealthy Malware Detection
Salvatore J. Stolfo, Ke Wang, Wei-Jen Li
231(22)
Part V Novel Techniques for Constructing Trustworthy Services
12 Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doom, Pradeep Khosla
253(38)
13 Principles of Secure Information Flow Analysis
Geoffrey Smith
291(18)
Index 309

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program