Automatic Malware Analysis

An Emulator Based Approach

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Automatic Malware Analysis by Dawn Song, Heng Yin, Springer New York
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Dawn Song, Heng Yin ISBN: 9781461455233
Publisher: Springer New York Publication: September 14, 2012
Imprint: Springer Language: English
Author: Dawn Song, Heng Yin
ISBN: 9781461455233
Publisher: Springer New York
Publication: September 14, 2012
Imprint: Springer
Language: English

Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware analysis and defense systems. 

Automatic Malware Analysis presents a virtualized malware analysis framework that addresses common challenges in malware analysis. In regards to this new analysis framework, a series of analysis techniques for automatic malware analysis is developed. These techniques capture intrinsic characteristics of malware, and are well suited for dealing with new malware samples and attack mechanisms.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware analysis and defense systems. 

Automatic Malware Analysis presents a virtualized malware analysis framework that addresses common challenges in malware analysis. In regards to this new analysis framework, a series of analysis techniques for automatic malware analysis is developed. These techniques capture intrinsic characteristics of malware, and are well suited for dealing with new malware samples and attack mechanisms.

More books from Springer New York

Cover of the book Neurointervention in the Medical Specialties by Dawn Song, Heng Yin
Cover of the book Tumor-Induced Immune Suppression by Dawn Song, Heng Yin
Cover of the book The Evolution of Exudativory in Primates by Dawn Song, Heng Yin
Cover of the book Gender and Thought: Psychological Perspectives by Dawn Song, Heng Yin
Cover of the book Lie Groups: Structure, Actions, and Representations by Dawn Song, Heng Yin
Cover of the book Engineering Foods for Bioactives Stability and Delivery by Dawn Song, Heng Yin
Cover of the book Pore Structure in Food by Dawn Song, Heng Yin
Cover of the book Complex Systems and Society by Dawn Song, Heng Yin
Cover of the book Reoperative Hand Surgery by Dawn Song, Heng Yin
Cover of the book Complementary & Alternative Medicine for Prostate and Urologic Health by Dawn Song, Heng Yin
Cover of the book Words as Social Tools: An Embodied View on Abstract Concepts by Dawn Song, Heng Yin
Cover of the book Residue Reviews by Dawn Song, Heng Yin
Cover of the book Signaling Pathways in Squamous Cancer by Dawn Song, Heng Yin
Cover of the book Trust for Intelligent Recommendation by Dawn Song, Heng Yin
Cover of the book The Omentum by Dawn Song, Heng Yin
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy