Automatic Malware Analysis

An Emulator Based Approach

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Automatic Malware Analysis by Dawn Song, Heng Yin, Springer New York
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Dawn Song, Heng Yin ISBN: 9781461455233
Publisher: Springer New York Publication: September 14, 2012
Imprint: Springer Language: English
Author: Dawn Song, Heng Yin
ISBN: 9781461455233
Publisher: Springer New York
Publication: September 14, 2012
Imprint: Springer
Language: English

Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware analysis and defense systems. 

Automatic Malware Analysis presents a virtualized malware analysis framework that addresses common challenges in malware analysis. In regards to this new analysis framework, a series of analysis techniques for automatic malware analysis is developed. These techniques capture intrinsic characteristics of malware, and are well suited for dealing with new malware samples and attack mechanisms.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware analysis and defense systems. 

Automatic Malware Analysis presents a virtualized malware analysis framework that addresses common challenges in malware analysis. In regards to this new analysis framework, a series of analysis techniques for automatic malware analysis is developed. These techniques capture intrinsic characteristics of malware, and are well suited for dealing with new malware samples and attack mechanisms.

More books from Springer New York

Cover of the book Hunting and Imaging Comets by Dawn Song, Heng Yin
Cover of the book Pediatric Nuclear Medicine and Molecular Imaging by Dawn Song, Heng Yin
Cover of the book The Retina and Circadian Rhythms by Dawn Song, Heng Yin
Cover of the book Epigenetic Alterations in Oncogenesis by Dawn Song, Heng Yin
Cover of the book Mathematical Theories of Distributed Sensor Networks by Dawn Song, Heng Yin
Cover of the book Bridging Mathematics, Statistics, Engineering and Technology by Dawn Song, Heng Yin
Cover of the book Epistemological Foundations of Mathematical Experience by Dawn Song, Heng Yin
Cover of the book Adaptable Embedded Systems by Dawn Song, Heng Yin
Cover of the book Virtual Reality for Physical and Motor Rehabilitation by Dawn Song, Heng Yin
Cover of the book Hand Function by Dawn Song, Heng Yin
Cover of the book Solvent Abuse by Dawn Song, Heng Yin
Cover of the book Models of Psychopathology by Dawn Song, Heng Yin
Cover of the book Choosing Your Practice by Dawn Song, Heng Yin
Cover of the book Medical Writing by Dawn Song, Heng Yin
Cover of the book Stem Cell Biology and Regenerative Medicine in Ophthalmology by Dawn Song, Heng Yin
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy