Automatic Malware Analysis

An Emulator Based Approach

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Automatic Malware Analysis by Dawn Song, Heng Yin, Springer New York
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Dawn Song, Heng Yin ISBN: 9781461455233
Publisher: Springer New York Publication: September 14, 2012
Imprint: Springer Language: English
Author: Dawn Song, Heng Yin
ISBN: 9781461455233
Publisher: Springer New York
Publication: September 14, 2012
Imprint: Springer
Language: English

Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware analysis and defense systems. 

Automatic Malware Analysis presents a virtualized malware analysis framework that addresses common challenges in malware analysis. In regards to this new analysis framework, a series of analysis techniques for automatic malware analysis is developed. These techniques capture intrinsic characteristics of malware, and are well suited for dealing with new malware samples and attack mechanisms.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware analysis and defense systems. 

Automatic Malware Analysis presents a virtualized malware analysis framework that addresses common challenges in malware analysis. In regards to this new analysis framework, a series of analysis techniques for automatic malware analysis is developed. These techniques capture intrinsic characteristics of malware, and are well suited for dealing with new malware samples and attack mechanisms.

More books from Springer New York

Cover of the book Finding Source Code on the Web for Remix and Reuse by Dawn Song, Heng Yin
Cover of the book Treatment of Benign Prostatic Hyperplasia: Modern Alternative to Transurethral Resection of the Prostate by Dawn Song, Heng Yin
Cover of the book The Physics of Music and Color by Dawn Song, Heng Yin
Cover of the book Handbook of Survey Methodology for the Social Sciences by Dawn Song, Heng Yin
Cover of the book Embryology by Dawn Song, Heng Yin
Cover of the book The Somatotrophic Axis and the Reproductive Process in Health and Disease by Dawn Song, Heng Yin
Cover of the book Handbook of Evidence-Based Critical Care by Dawn Song, Heng Yin
Cover of the book Daylight Science and Daylighting Technology by Dawn Song, Heng Yin
Cover of the book Cognitive and Rational-Emotive Behavior Therapy with Couples by Dawn Song, Heng Yin
Cover of the book Thin Impedance Vibrators by Dawn Song, Heng Yin
Cover of the book Interdisciplinary Applications of the Person-Centered Approach by Dawn Song, Heng Yin
Cover of the book Logic, Mathematics, and Computer Science by Dawn Song, Heng Yin
Cover of the book Pricing Derivatives Under Lévy Models by Dawn Song, Heng Yin
Cover of the book Applied Evolutionary Anthropology by Dawn Song, Heng Yin
Cover of the book Sodium and Water Homeostasis by Dawn Song, Heng Yin
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy