Automatic Malware Analysis

An Emulator Based Approach

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Automatic Malware Analysis by Dawn Song, Heng Yin, Springer New York
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Dawn Song, Heng Yin ISBN: 9781461455233
Publisher: Springer New York Publication: September 14, 2012
Imprint: Springer Language: English
Author: Dawn Song, Heng Yin
ISBN: 9781461455233
Publisher: Springer New York
Publication: September 14, 2012
Imprint: Springer
Language: English

Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware analysis and defense systems. 

Automatic Malware Analysis presents a virtualized malware analysis framework that addresses common challenges in malware analysis. In regards to this new analysis framework, a series of analysis techniques for automatic malware analysis is developed. These techniques capture intrinsic characteristics of malware, and are well suited for dealing with new malware samples and attack mechanisms.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware analysis and defense systems. 

Automatic Malware Analysis presents a virtualized malware analysis framework that addresses common challenges in malware analysis. In regards to this new analysis framework, a series of analysis techniques for automatic malware analysis is developed. These techniques capture intrinsic characteristics of malware, and are well suited for dealing with new malware samples and attack mechanisms.

More books from Springer New York

Cover of the book The Role of Genetics in Breast and Reproductive Cancers by Dawn Song, Heng Yin
Cover of the book The Geography of Competition by Dawn Song, Heng Yin
Cover of the book Atlas of Esophageal Disease and Intervention by Dawn Song, Heng Yin
Cover of the book Pediatric Orthopedic Surgical Emergencies by Dawn Song, Heng Yin
Cover of the book Diagnosis of Endometrial Biopsies and Curettings by Dawn Song, Heng Yin
Cover of the book A New Understanding of Terrorism by Dawn Song, Heng Yin
Cover of the book Handbook of the Sociology of Morality by Dawn Song, Heng Yin
Cover of the book Cesarean Section by Dawn Song, Heng Yin
Cover of the book New Science of Learning by Dawn Song, Heng Yin
Cover of the book Bayesian Networks and Influence Diagrams: A Guide to Construction and Analysis by Dawn Song, Heng Yin
Cover of the book Constructive Nonsmooth Analysis and Related Topics by Dawn Song, Heng Yin
Cover of the book The Strength of Self-Acceptance by Dawn Song, Heng Yin
Cover of the book The Amateur Astronomer's Guide to the Deep-Sky Catalogs by Dawn Song, Heng Yin
Cover of the book Mainstream Polygamy by Dawn Song, Heng Yin
Cover of the book Global Analysis of Nonlinear Dynamics by Dawn Song, Heng Yin
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy