Logo - springer
Slogan - springer

Computer Science - Security and Cryptology | Automatic Malware Analysis - An Emulator Based Approach

Automatic Malware Analysis

An Emulator Based Approach

Yin, Heng, Song, Dawn

2013, IX, 73 p. 15 illus.

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 
$29.95

(net) price for USA

ISBN 978-1-4614-5523-3

digitally watermarked, no DRM

Included Format: PDF and EPUB

download immediately after purchase


learn more about Springer eBooks

add to marked items

Softcover
Information

Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$39.95

(net) price for USA

ISBN 978-1-4614-5522-6

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware analysis and defense systems. 

Automatic Malware Analysis presents a virtualized malware analysis framework that addresses common challenges in malware analysis. In regards to this new analysis framework, a series of analysis techniques for automatic malware analysis is developed. These techniques capture intrinsic characteristics of malware, and are well suited for dealing with new malware samples and attack mechanisms.

Content Level » Research

Keywords » Binary Analysis - Dynamic Binary Instrumentation - Dynamic Taint Analysis - Malware Analysis - Virtualization

Related subjects » Database Management & Information Retrieval - Information Systems and Applications - Security and Cryptology

Table of contents 

Introduction.- Dynamic Binary Analysis Platform.- Hidden Code Extraction.- Privacy-breaching Behavior Analysis.- Hooking Behavior Analysis.- Analysis of Trigger Conditions and Hidden Behaviors.- Concluding Remarks.

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Systems and Data Security.