Skip to content

Malware Detection

Best in textbook rentals since 2012!

ISBN-10: 0387327207

ISBN-13: 9780387327204

Edition: 2007

Authors: Somesh Jha, Cliff Wang, Dawn Song, Douglas Maughan, Mihai Christodorescu

List price: $329.99
Blue ribbon 30 day, 100% satisfaction guarantee!
Rent eBooks
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many malicious attacks are achieved by malicious code or malware, such as viruses and worms. Given the deleterious affects of malware on our cyber infrastructure, identifying malicious programs is an important goal. Unfortunately, malware detectors have not kept pace with the evasion techniques commonly used by hackers, i.e., the good guys are falling…    
Customers also bought

Book details

List price: $329.99
Copyright year: 2007
Publisher: Springer
Publication date: 10/31/2006
Binding: Hardcover
Pages: 312
Size: 6.10" wide x 9.25" long x 0.34" tall
Weight: 1.430
Language: English

Overview
Malware Evolution: A Snapshot of Threats and Countermeasures in 2005
Software Analysis and Assurance
Static Disassembly and Code Analysis
A Next-Generation Platform for Analyzing Executables
Behavioral and Structural Properties of Malicious Code
Detection and Prevention of SQL Injection Attacks
Distributed Threat Detection and Defense
Very Fast Containment of Scanning Worms, Revisited
Sting: An End-to-End Self-Healing System for Defending against Internet Worms
An Inside Look at Botnets
Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy?
Stealthy and Targeted Threat Detection and Defense
Composite Hybrid Techniques For Defending Against Targeted Attacks
Towards Stealthy Malware Detection
Novel Techniques for Constructing Trustworthy Services
Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems
Principles of Secure Information Flow Analysis
Index