By Erez Metula
Managed Code Rootkits is the 1st ebook to hide application-level rootkits and different varieties of malware contained in the software VM, which runs a platform-independent programming atmosphere for procedures. The publication, divided into 4 elements, issues out high-level assaults, that are built in intermediate language.
The preliminary a part of the publication bargains an outline of controlled code rootkits. It explores setting types of controlled code and the connection of controlled code to rootkits by means of learning how they use software VMs. It additionally discusses attackers of controlled code rootkits and diverse assault situations. the second one a part of the e-book covers the advance of controlled code rootkits, beginning with the instruments utilized in generating controlled code rootkits via their deployment.
The subsequent half specializes in countermeasures that could in all likelihood be used opposed to controlled code rootkits, together with technical strategies, prevention, detection, and reaction strategies. The booklet concludes through proposing suggestions which are in some way just like controlled code rootkits, that are utilized in fixing difficulties.
- Named a 2011 most sensible Hacking and Pen trying out ebook via InfoSec Reviews
- Introduces the reader in brief to controlled code environments and rootkits in general
- Completely info a brand new form of rootkit hiding within the software point and demonstrates how a hacker can swap language runtime implementation
- Focuses on controlled code together with Java, .NET, Android Dalvik and stories malware improvement scanarios
Read Online or Download Managed Code Rootkits: Hooking into Runtime Environments PDF
Similar business information technology books
The vintage publication The paintings of conflict (or because it is usually translated, The artwork of procedure) through solar Tzu is usually used to demonstrate rules that may practice to the administration of industrial environments. The artwork of warfare for safeguard Managers is the 1st ebook to use the accepted rules of sunlight Tzu’s theories of clash to modern organizational safeguard.
Daniel Fischer entwickelt und evaluiert ein Hilfsmittel zur Bestimmung des Grades der unternehmensübergreifenden Integration von Informationssystemen auf elektronischen Marktplätzen. Das Hilfsmittel ermöglicht eine umfassende und differenzierte Beschreibung und Bewertung der Integration.
The improvement of IT Governance, which acknowledges the convergence among enterprise and IT administration, makes it crucial for managers in any respect degrees and in firms of all sizes to appreciate how most sensible to house details safeguard hazards. foreign IT Governance explores new laws, together with the release of ISO/IEC 27001, which makes a unmarried, international ordinary of knowledge safety most sensible perform on hand.
Dieses Buch ist ein Praxisleitfaden zum Thema Informationssicherheits-Management und gleichzeitig Begleitbuch für die Prüfungsvorbereitung zum 'Certified info defense supervisor (CISM)' nach ISACA. Nach einer Einleitung bereitet der erste Teil des Buches in vier Kapiteln auf das CISM-Examen vor.
Additional resources for Managed Code Rootkits: Hooking into Runtime Environments
Managed Code Rootkits: Hooking into Runtime Environments by Erez Metula