Identifying Malicious Code Through Reverse Engineering
Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world. Identifying Malicious Code through Reverse Engineering provides information on reverse...
Corporate Author: | |
---|---|
Other Authors: | |
Format: | Electronic |
Language: | English |
Published: |
Boston, MA :
Springer US,
2009.
|
Series: | Advances in Information Security,
44 |
Subjects: | |
Online Access: | https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-0-387-89468-3 |
Table of Contents:
- Preface
- Fundamentals of Assembly
- Fundamental of Windows
- Executable formats
- Reversing Binaries for Vulnerabilities
- Reversing .Net Applications
- Reversing Patches for Identification of Vulnerabilities
- Anti ReversingTechniques
- Index. .