Managed Code Rootkits: Hooking into Runtime Environments by Erez Metula PDF

By Erez Metula

ISBN-10: 1597495743

ISBN-13: 9781597495745

Managed Code Rootkits is the 1st ebook to hide application-level rootkits and different varieties of malware contained in the software VM, which runs a platform-independent programming atmosphere for procedures. The publication, divided into 4 elements, issues out high-level assaults, that are built in intermediate language.

The preliminary a part of the publication bargains an outline of controlled code rootkits. It explores setting types of controlled code and the connection of controlled code to rootkits by means of learning how they use software VMs. It additionally discusses attackers of controlled code rootkits and diverse assault situations. the second one a part of the e-book covers the advance of controlled code rootkits, beginning with the instruments utilized in generating controlled code rootkits via their deployment.

The subsequent half specializes in countermeasures that could in all likelihood be used opposed to controlled code rootkits, together with technical strategies, prevention, detection, and reaction strategies. The booklet concludes through proposing suggestions which are in some way just like controlled code rootkits, that are utilized in fixing difficulties.

  • Named a 2011 most sensible Hacking and Pen trying out ebook via InfoSec Reviews
  • Introduces the reader in brief to controlled code environments and rootkits in general
  • Completely info a brand new form of rootkit hiding within the software point and demonstrates how a hacker can swap language runtime implementation
  • Focuses on controlled code together with Java, .NET, Android Dalvik and stories malware improvement scanarios

Show description

Read Online or Download Managed Code Rootkits: Hooking into Runtime Environments PDF

Similar business information technology books

Get The Art of War for Security Managers: 10 Steps to Enhancing PDF

The vintage publication The paintings of conflict (or because it is usually translated, The artwork of procedure) through solar Tzu is usually used to demonstrate rules that may practice to the administration of industrial environments. The artwork of warfare for safeguard Managers is the 1st ebook to use the accepted rules of sunlight Tzu’s theories of clash to modern organizational safeguard.

Download PDF by Daniel Fischer,Prof. Dr. Dirk Stelzer: Unternehmensübergreifende Integration von

Daniel Fischer entwickelt und evaluiert ein Hilfsmittel zur Bestimmung des Grades der unternehmensübergreifenden Integration von Informationssystemen auf elektronischen Marktplätzen. Das Hilfsmittel ermöglicht eine umfassende und differenzierte Beschreibung und Bewertung der Integration.

Download e-book for kindle: International IT Governance: An Executive Guide to ISO by Alan Calder

The improvement of IT Governance, which acknowledges the convergence among enterprise and IT administration, makes it crucial for managers in any respect degrees and in firms of all sizes to appreciate how most sensible to house details safeguard hazards. foreign IT Governance explores new laws, together with the release of ISO/IEC 27001, which makes a unmarried, international ordinary of knowledge safety most sensible perform on hand.

Download e-book for iPad: Informationssicherheits-Management: Leitfaden für Praktiker by Christoph Wegener,Thomas Milde,Wilhelm Dolle

Dieses Buch ist ein Praxisleitfaden zum Thema Informationssicherheits-Management und gleichzeitig Begleitbuch für die Prüfungsvorbereitung zum 'Certified info defense supervisor (CISM)' nach ISACA. Nach einer Einleitung bereitet der erste Teil des Buches in vier Kapiteln auf das CISM-Examen vor.

Additional resources for Managed Code Rootkits: Hooking into Runtime Environments

Example text

Download PDF sample

Managed Code Rootkits: Hooking into Runtime Environments by Erez Metula

by Joseph

Rated 4.14 of 5 – based on 41 votes