跳到内容
Automatic malware analysis : an emulator based approach 预览资料
关闭预览资料
正在查...

Automatic malware analysis : an emulator based approach

著者: Heng Yin; Dawn Song
出版商: New York : Springer, ©2013.
丛书: SpringerBriefs in computer science.
版本/格式:   电子图书 : 文献 : 英语查看所有的版本和格式
数据库:WorldCat
提要:
"Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware analysis and defense systems. Automatic Malware Analysis presents a virtualized  再读一些...
评估:

(尚未评估) 0 附有评论 - 争取成为第一个。

主题
更多类似这样的

 

在线查找

与资料的链接

在图书馆查找

&AllPage.SpinnerRetrieving; 正在查找有这资料的图书馆...

详细书目

类型/形式: Electronic books
附加的形体格式: Print version:
Yin, Heng.
Automatic malware analysis.
New York : Springer, c2013
(DLC) 2012945632
(OCoLC)805044588
材料类型: 文献, 互联网资源
文件类型: 互联网资源, 计算机文档
所有的著者/提供者: Heng Yin; Dawn Song
ISBN: 9781461455233 1461455235
OCLC号码: 811139541
描述: 1 online resource (ix, 73 p.) : ill.
内容: Dynamic Binary Analysis Platform --
Hidden Code Extraction --
Privacy-breaching Behavior Analysis --
Hooking Behavior Analysis --
Analysis of Trigger Conditions and Hidden Behaviors --
Concluding Remarks.
丛书名: SpringerBriefs in computer science.
责任: Heng Yin, Dawn Song.
更多信息:

摘要:

"Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware analysis and defense systems. Automatic Malware Analysis presents a virtualized malware analysis framework that addresses common challenges in malware analysis. In regards to this new analysis framework, a series of analysis techniques for automatic malware analysis is developed. These techniques capture intrinsic characteristics of malware, and are well suited for dealing with new malware samples and attack mechanisms"--Provided by publisher.

评论

社评

出版商概要

From the reviews: "The authors present their architecture for dynamic binary analysis of malware. ... The authors do this quite well. Each chapter ends with a chapter summary and extensive 再读一些...

 
用户提供的评论
正在获取GoodReads评论...
正在检索DOGObooks的评论

标签

争取是第一个!
确认申请

你可能已经申请过这份资料。如果还是想申请,请选确认。

链接数据


Primary Entity

<http://www.worldcat.org/oclc/811139541> # Automatic malware analysis an emulator based approach
    a schema:CreativeWork, schema:Book, schema:MediaObject ;
    library:oclcnum "811139541" ;
    library:placeOfPublication <http://dbpedia.org/resource/New_York_City> ; # New York
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/nyu> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/1169469743#Topic/computers_security_viruses> ; # COMPUTERS / Security / Viruses
    schema:about <http://experiment.worldcat.org/entity/work/data/1169469743#Thing/information_systems_and_communication_service> ; # Information Systems and Communication Service.
    schema:about <http://experiment.worldcat.org/entity/work/data/1169469743#Thing/systems_and_data_security> ; # Systems and Data Security.
    schema:about <http://experiment.worldcat.org/entity/work/data/1169469743#Thing/data_protection> ; # Data protection.
    schema:about <http://id.worldcat.org/fast/1748230> ; # Malware (Computer software)
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/1169469743#Thing/data_structures_computer_science> ; # Data structures (Computer science).
    schema:about <http://dewey.info/class/005.84/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/1169469743#Topic/computer_security> ; # Computer Security
    schema:about <http://experiment.worldcat.org/entity/work/data/1169469743#Thing/information_systems_applications_incl_internet> ; # Information Systems Applications (incl. Internet).
    schema:about <http://experiment.worldcat.org/entity/work/data/1169469743#Thing/data_encryption_computer_science> ; # Data encryption (Computer science).
    schema:bookFormat schema:EBook ;
    schema:contributor <http://experiment.worldcat.org/entity/work/data/1169469743#Person/song_dawn> ; # Dawn Song
    schema:copyrightYear "2013" ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/1169469743#Person/yin_heng> ; # Heng Yin
    schema:datePublished "2013" ;
    schema:description ""Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware analysis and defense systems. Automatic Malware Analysis presents a virtualized malware analysis framework that addresses common challenges in malware analysis. In regards to this new analysis framework, a series of analysis techniques for automatic malware analysis is developed. These techniques capture intrinsic characteristics of malware, and are well suited for dealing with new malware samples and attack mechanisms"--Provided by publisher." ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1169469743> ;
    schema:genre "Electronic books" ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://worldcat.org/issn/2191-5776> ; # SpringerBriefs in computer science,
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1169469743#Series/springerbriefs_in_computer_science> ; # SpringerBriefs in computer science.
    schema:isSimilarTo <http://www.worldcat.org/oclc/805044588> ;
    schema:name "Automatic malware analysis an emulator based approach" ;
    schema:numberOfPages "73" ;
    schema:productID "811139541" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/811139541#PublicationEvent/new_york_springer_c2013> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/1169469743#Agent/springer> ; # Springer
    schema:url <http://swb.eblib.com/patron/FullRecord.aspx?p=1030912> ;
    schema:url <http://site.ebrary.com/id/10603513> ;
    schema:url <http://www.books24x7.com/marc.asp?bookid=76676> ;
    schema:url <http://dx.doi.org/10.1007/978-1-4614-5523-3> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=533361> ;
    schema:workExample <http://worldcat.org/isbn/9781461455233> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/811139541> ;
    .


Related Entities

<http://dbpedia.org/resource/New_York_City> # New York
    a schema:Place ;
    schema:name "New York" ;
    .

<http://experiment.worldcat.org/entity/work/data/1169469743#Person/song_dawn> # Dawn Song
    a schema:Person ;
    schema:familyName "Song" ;
    schema:givenName "Dawn" ;
    schema:name "Dawn Song" ;
    .

<http://experiment.worldcat.org/entity/work/data/1169469743#Series/springerbriefs_in_computer_science> # SpringerBriefs in computer science.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/811139541> ; # Automatic malware analysis an emulator based approach
    schema:name "SpringerBriefs in computer science." ;
    .

<http://experiment.worldcat.org/entity/work/data/1169469743#Thing/data_encryption_computer_science> # Data encryption (Computer science).
    a schema:Thing ;
    schema:name "Data encryption (Computer science)." ;
    .

<http://experiment.worldcat.org/entity/work/data/1169469743#Thing/data_protection> # Data protection.
    a schema:Thing ;
    schema:name "Data protection." ;
    .

<http://experiment.worldcat.org/entity/work/data/1169469743#Thing/data_structures_computer_science> # Data structures (Computer science).
    a schema:Thing ;
    schema:name "Data structures (Computer science)." ;
    .

<http://experiment.worldcat.org/entity/work/data/1169469743#Thing/information_systems_and_communication_service> # Information Systems and Communication Service.
    a schema:Thing ;
    schema:name "Information Systems and Communication Service." ;
    .

<http://experiment.worldcat.org/entity/work/data/1169469743#Thing/information_systems_applications_incl_internet> # Information Systems Applications (incl. Internet).
    a schema:Thing ;
    schema:name "Information Systems Applications (incl. Internet)." ;
    .

<http://experiment.worldcat.org/entity/work/data/1169469743#Thing/systems_and_data_security> # Systems and Data Security.
    a schema:Thing ;
    schema:name "Systems and Data Security." ;
    .

<http://experiment.worldcat.org/entity/work/data/1169469743#Topic/computer_security> # Computer Security
    a schema:Intangible ;
    schema:name "Computer Security" ;
    .

<http://experiment.worldcat.org/entity/work/data/1169469743#Topic/computers_security_viruses> # COMPUTERS / Security / Viruses
    a schema:Intangible ;
    schema:name "COMPUTERS / Security / Viruses" ;
    .

<http://id.worldcat.org/fast/1748230> # Malware (Computer software)
    a schema:Intangible ;
    schema:name "Malware (Computer software)" ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security" ;
    .

<http://worldcat.org/isbn/9781461455233>
    a schema:ProductModel ;
    schema:description "electronic bk." ;
    schema:isbn "1461455235" ;
    schema:isbn "9781461455233" ;
    .

<http://worldcat.org/issn/2191-5776> # SpringerBriefs in computer science,
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/811139541> ; # Automatic malware analysis an emulator based approach
    schema:issn "2191-5776" ;
    schema:name "SpringerBriefs in computer science," ;
    .

<http://www.worldcat.org/oclc/805044588>
    a schema:CreativeWork ;
    rdfs:label "Automatic malware analysis." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/811139541> ; # Automatic malware analysis an emulator based approach
    .


Content-negotiable representations

关闭窗口

请登入WorldCat 

没有张号吗?很容易就可以 建立免费的账号.