32%
Art of Computer Virus Research and Defense, The

Art of Computer Virus Research and Defense, The

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

Peter Szor takes you behind the scenes of anti-virus research, showing howthey are analyzed, how they spread, and--most importantly--how to effectivelydefend against them. This book offers an encyclopedic treatment of thecomputer virus, including: a history of computer viruses, virus behavior,classification, protection strategies, anti-virus and worm-blocking techniques,and how to conduct an accurate threat analysis. The Art of Computer VirusResearch and Defense entertains readers with its look at anti-virus research, butmore importantly it truly arms them in the fight against computer viruses.As one of the lead researchers behind Norton AntiVirus, the most popularantivirus program in the industry, Peter Szor studies viruses every day. Byshowing how viruses really work, this book will help security professionals andstudents protect against them, recognize them, and analyze and limit thedamage they can do.

Table of Contents:
About the Author. Preface. Acknowledgments. I. STRATEGIES OF THE ATTACKER. 1. Introduction to the Games of Nature.     Early Models of Self-Replicating Structures       John von Neumann: Theory of Self-Reproducing Automata       Fredkin: Reproducing Structures       Conway: Game of Life       Core War: The Fighting Programs     Genesis of Computer Viruses     Automated Replicating Code: The Theory and Definition of Computer Viruses     References 2. The Fascination of Malicious Code Analysis.     Common Patterns of Virus Research     Antivirus Defense Development     Terminology of Malicious Programs       Viruses       Worms       Logic Bombs       Trojan Horses       Germs       Exploits       Downloaders       Dialers       Droppers       Injectors       Auto-Rooters       Kits (Virus Generators)       Spammer Programs       Flooders       Keyloggers       Rootkits     Other Categories       Joke Programs       Hoaxes: Chain Letters       Other Pests: Adware and Spyware     Computer Malware Naming Scheme             ://       /       .                   []             :       #       @m or @mm       !     Annotated List of Officially Recognized Platform Names     References 3. Malicious Code Environments.     Computer Architecture Dependency     CPU Dependency     Operating System Dependency     Operating System Version Dependency     File System Dependency       Cluster Viruses       NTFS Stream Viruses       NTFS Compression Viruses       ISO Image Infection     File Format Dependency       COM Viruses on DOS       EXE Viruses on DOS       NE (New Executable) Viruses on 16-bit Windows and OS/2       LX Viruses on OS/2       PE (Portable Executable) Viruses on 32-bit Windows       ELF (Executable and Linking Format) Viruses on UNIX       Device Driver Viruses       Object Code and LIB Viruses     Interpreted Environment Dependency       Macro Viruses in Microsoft Products       REXX Viruses on IBM Systems       DCL (DEC Command Language) Viruses on DEC/VMS       Shell Scripts on UNIX (csh, ksh, and bash)       VBScript (Visual Basic Script) Viruses on Windows Systems       BATCH Viruses       Instant Messaging Viruses in mIRC, PIRCH scripts       SuperLogo Viruses       JScript Viruses       Perl Viruses       WebTV Worms in JellyScript Embedded in HTML Mail       Python Viruses       VIM Viruses       EMACS Viruses       TCL Viruses       PHP Viruses       MapInfo Viruses       ABAP Viruses on SAP       Help File Viruses on Windows–When You Press F1…       JScript Threats in Adobe PDF       AppleScript Dependency       ANSI Dependency       Macromedia Flash ActionScript Threats       HyperTalk Script Threats       AutoLisp Script Viruses       Registry Dependency       PIF and LNK Dependency       Lotus Word Pro Macro Viruses       AmiPro Document Viruses       Corel Script Viruses       Lotus 1-2-3 Macro Dependency       Windows Installation Script Dependency       AUTORUN.INF and Windows INI File Dependency       HTML (Hypertext Markup Language) Dependency     Vulnerability Dependency     Date and Time Dependency     JIT Dependency: Microsoft .NET Viruses     Archive Format Dependency     File Format Dependency Based on Extension     Network Protocol Dependency     Source Code Dependency       Source Code Trojans     Resource Dependency on Mac and Palm Platforms     Host Size Dependency     Debugger Dependency       Intended Threats that Rely on a Debugger     Compiler and Linker Dependency     Device Translator Layer Dependency     Embedded Object Insertion Dependency     Self-Contained Environment Dependency     Multipartite Viruses     Conclusion     References 4. Classification of Infection Strategies.     Boot Viruses       Master Boot Record (MBR) Infection Techniques       DOS BOOT Record (DBR) - Infection Techniques       Boot Viruses That Work While Windows 95 Is Active       Possible Boot Image Attacks in Network Environments     File Infection Techniques       Overwriting Viruses       Random Overwriting Viruses       Appending Viruses       Prepending Viruses       Classic Parasitic Viruses       Cavity Viruses       Fractionated Cavity Viruses       Compressing Viruses       Amoeba Infection Technique       Embedded Decryptor Technique       Embedded Decryptor and Virus Body Technique       Obfuscated Tricky Jump Technique       Entry-Point Obscuring (EPO) Viruses       Possible Future Infection Techniques: Code Builders     An In-Depth Look at Win32 Viruses       The Win32 API and Platforms That Support It       Infection Techniques on 32-Bit Windows       Win32 and Win64 Viruses: Designed for Microsoft Windows?     Conclusion     References 5. Classification of In-Memory Strategies.     Direct-Action Viruses     Memory-Resident Viruses       Interrupt Handling and Hooking       Hook Routines on INT 13h (Boot Viruses)       Hook Routines on INT 21h (File Viruses)       Common Memory Installation Techniques Under DOS       Stealth Viruses       Disk Cache and System Buffer Infection     Temporary Memory-Resident Viruses     Swapping Viruses     Viruses in Processes (in User Mode)     Viruses in Kernel Mode (Windows 9x/Me)     Viruses in Kernel Mode (Windows NT/2000/XP)     In-Memory Injectors over Networks     References 6. Basic Self-Protection Strategies.     Tunneling Viruses       Memory Scanning for Original Handler       Tracing with Debug Interfaces       Code Emulation—Based Tunneling       Accessing the Disk Using Port I/O       Using Undocumented Functions     Armored Viruses       Antidisassembly       Encrypted Data       Code Confusion to Avoid Analysis       Opcode Mixing—Based Code Confusion       Using Checksum       Compressed, Obfuscated Code       Antidebugging       Antiheuristics       Antiemulation Techniques       Antigoat Viruses     Aggressive Retroviruses     References 7. Advanced Code Evolution Techniques and Computer Virus Generator Kits.     Introduction     Evolution of Code     Encrypted Viruses     Oligomorphic Viruses     Polymorphic Viruses       The 1260 Virus       The Dark Avenger Mutation Engine (MtE)       32-Bit Polymorphic Viruses     Metamorphic Viruses       What Is a Metamorphic Virus?       Simple Metamorphic Viruses       More Complex Metamorphic Viruses and Permutation Techniques       Mutating Other Applications: The Ultimate Virus Generator?       Advanced Metamorphic Viruses: Zmist       {W32, Linux}/Simile: A Metamorphic Engine Across Systems       The Dark Future–MSIL Metamorphic Viruses     Virus Construction Kits       VCS (Virus Construction Set)       GenVir       VCL (Virus Creation Laboratory)       PS-MPC (Phalcon-Skism Mass-Produced Code Generator)       NGVCK (Next Generation Virus Creation Kit)       Other Kits and Mutators       How to Test a Virus Construction Tool?     References 8. Classification According to Payload.     No-Payload     Accidentally Destructive Payload     Nondestructive Payload     Somewhat Destructive Payload     Highly Destructive Payload       Viruses That Overwrite Data       Data Diddlers       Viruses That Encrypt Data: The “Good,” the Bad, and the Ugly       Hardware Destroyers     DoS (Denial of Service) Attacks     Data Stealers: Making Money with Viruses       Phishing Attacks       Backdoor Features     Conclusion     References 9. Strategies of Computer Worms.     Introduction     The Generic Structure of Computer Worms       Target Locator       Infection Propagator       Remote Control and Update Interface       Life-Cycle Manager       Payload       Self-Tracking     Target Locator       E-Mail Address Harvesting       Network Share Enumeration Attacks       Network Scanning and Target Fingerprinting     Infection Propagators       Attacking Backdoor-Compromised Systems       Peer-to-Peer Network Attacks       Instant Messaging Attacks       E-Mail Worm Attacks and Deception Techniques       E-Mail Attachment Inserters       SMTP Proxy—Based Attacks       SMTP Attacks       SMTP Propagation on Steroids Using MX Queries       NNTP (Network News Transfer Protocol) Attacks     Common Worm Code Transfer and Execution Techniques       Executable Code—Based Attacks       Links to Web Sites or Web Proxies       HTML-Based Mail       Remote Login-Based Attacks       Code Injection Attacks       Shell Code—Based Attacks     Update Strategies of Computer Worms       Authenticated Updates on the Web or Newsgroups       Backdoor-Based Updates     Remote Control via Signaling       Peer-to-Peer Network Control     Intentional and Accidental Interactions       Cooperation       Competition       The Future: A Simple Worm Communication Protocol?     Wireless Mobile Worms     References 10. Exploits, Vulnerabilities, and Buffer Overflow Attacks.     Introduction       Definition of Blended Attack       The Threat     Background     Types of Vulnerabilities       Buffer Overflows       First-Generation Attacks       Second-Generation Attacks       Third-Generation Attacks     Current and Previous Threats       The Morris Internet Worm, 1988 (Stack Overflow to Run  - Shellcode)       Linux/ADM, 1998 (“Copycatting” the Morris Worm)       The CodeRed Outbreak, 2001 (The Code Injection Attack)       Linux/Slapper Worm, 2002 (A Heap Overflow Example)       W32/Slammer Worm, January 2003 (The Mini Worm)       Blaster Worm, August 2003 (Shellcode-Based Attack on Win32)       Generic Buffer Overflow Usage in Computer Viruses       Description of W32/Badtrans.B@mm       Exploits in W32/Nimda.A@mm       Description of W32/Bolzano       Description of VBS/Bubbleboy       Description of W32/Blebla     Summary     References II. STRATEGIES OF THE DEFENDER. 11. Antivirus Defense Techniques.     First-Generation Scanners       String Scanning       Wildcards       Mismatches       Generic Detection       Hashing       Bookmarks       Top-and-Tail Scanning       Entry-Point and Fixed-Point Scanning       Hyperfast Disk Access     Second-Generation Scanners       Smart Scanning       Skeleton Detection       Nearly Exact Identification       Exact Identification     Algorithmic Scanning Methods       Filtering       Static Decryptor Detection       The X-RAY Method     Code Emulation       Encrypted and Polymorphic Virus Detection Using Emulation       Dynamic Decryptor Detection     Metamorphic Virus Detection Examples       Geometric Detection       Disassembling Techniques       Using Emulators for Tracing     Heuristic Analysis of 32-Bit Windows Viruses       Code Execution Starts in the Last Section       Suspicious Section Characteristics       Virtual Size Is Incorrect in PE Header       Possible “Gap” Between Sections       Suspicious Code Redirection       Suspicious Code Section Name       Possible Header Infection       Suspicious Imports from KERNEL32.DLL by Ordinal       Import Address Table Is Patched       Multiple PE Headers       Multiple Windows Headers and Suspicious KERNEL32.DLL Imports       Suspicious Relocations       Kernel Look-Up       Kernel Inconsistency       Loading a Section into the VMM Address Space       Incorrect Size of Code in Header       Examples of Suspicious Flag Combinations     Heuristic Analysis Using Neural Networks     Regular and Generic Disinfection Methods       Standard Disinfection       Generic Decryptors       How Does a Generic Disinfector Work?       How Can the Disinfector Be Sure That the File Is Infected?       Where Is the Original End of the Host File?       How Many Virus Types Can We Handle This Way?       Examples of Heuristics for Generic Repair       Generic Disinfection Examples     Inoculation     Access Control Systems     Integrity Checking       False Positives       Clean Initial State       Speed       Special Objects       Necessity of Changed Objects       Possible Solutions     Behavior Blocking     Sand-Boxing     Conclusion     References 12. Memory Scanning and Disinfection.     Introduction     The Windows NT Virtual Memory System     Virtual Address Spaces     Memory Scanning in User Mode       The Secrets of NtQuerySystemInform-ation()       Common Processes and Special System Rights       Viruses in the Win32 Subsystem       Win32 Viruses That Allocate Private Pages       Native Windows NT Service Viruses       Win32 Viruses That Use a Hidden Window Procedure       Win32 Viruses That Are Part of the Executed Image Itself     Memory Scanning and Paging       Enumerating Processes and Scanning File Images     Memory Disinfection       Terminating a Particular Process That Contains Virus Code       Detecting and Terminating Virus Threads       Patching the Virus Code in the Active Pages       How to Disinfect Loaded DLLs and Running Applications     Memory Scanning in Kernel Mode       Scanning the User Address Space of Processes       Determining NT Service API Entry Points       Important NT Functions for Kernel-Mode Memory Scanning       Process Context       Scanning the Upper 2GB of Address Space       How Can You Deactivate a Filter Driver Virus?       Dealing with Read-Only Kernel Memory       Kernel-Mode Memory Scanning on 64-Bit Platforms     Possible Attacks Against Memory Scanning     Conclusion and Future Work     References 13. Worm-Blocking Techniques and Host-Based Intrusion Prevention.     Introduction       Script Blocking and SMTP Worm Blocking       New Attacks to Block: CodeRed, Slammer     Techniques to Block Buffer Overflow Attacks       Code Reviews       Compiler-Level Solutions       Operating System-Level Solutions and Run-Time Extensions       Subsystem Extensions–Libsafe       Kernel Mode Extensions       Program Shepherding     Worm-Blocking Techniques       Injected Code Detection       Send Blocking: An Example of Blocking Self-Sending Code       Exception Handler Validation       Other Return-to-LIBC Attack Mitigation Techniques       “GOT” and “IAT” Page Attributes       High Number of Connections and Connection Errors     Possible Future Worm Attacks       A Possible Increase of Retroworms       “Slow” Worms Below the Radar       Polymorphic and Metamorphic Worms       Largescale Damage       Automated Exploit Discovery–Learning from the Environment     Conclusion     References 14. Network-Level Defense Strategies.     Introduction     Using Router Access Lists     Firewall Protection     Network-Intrusion Detection Systems     Honeypot Systems     Counterattacks     Early Warning Systems     Worm Behavior Patterns on the Network       Capturing the Blaster Worm       Capturing the Linux/Slapper Worm       Capturing the W32/Sasser.D Worm       Capturing the Ping Requests of the W32/Welchia Worm       Detecting W32/Slammer and Related Exploits     Conclusion     References 15. Malicious Code Analysis Techniques.     Your Personal Virus Analysis Laboratory       How to Get the Software?     Information, Information, Information       Architecture Guides       Knowledge Base     Dedicated Virus Analysis on VMWARE     The Process of Computer Virus Analysis       Preparation       Unpacking       Disassembling and Decryption       Dynamic Analysis Techniques     Maintaining a Malicious Code Collection     Automated Analysis: The Digital Immune System     References 16. Conclusion.     Further Reading       Information on Security and Early Warnings       Security Updates       Computer Worm Outbreak Statistics       Computer Virus Research Papers       Contact Information for Antivirus Vendors       Antivirus Testers and Related Sites Index.  


Best Sellers


Product Details
  • ISBN-13: 9780321304544
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Addison-Wesley Educational Publishers Inc
  • Depth: 38
  • Height: 234 mm
  • No of Pages: 744
  • Series Title: Symantec Press
  • Weight: 1030 gr
  • ISBN-10: 0321304543
  • Publisher Date: 17 Feb 2005
  • Binding: Paperback
  • Edition: Annotated edition
  • Language: English
  • Returnable: N
  • Spine Width: 33 mm
  • Width: 175 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Art of Computer Virus Research and Defense, The
Pearson Education (US) -
Art of Computer Virus Research and Defense, The
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Art of Computer Virus Research and Defense, The

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA