Computer Viruses And Malware

by
Format: Hardcover
Pub. Date: 2006-07-20
Publisher(s): Springer-Verlag New York Inc
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $149.99

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:30 Days access
Downloadable:30 Days
$46.44
Online:60 Days access
Downloadable:60 Days
$61.92
Online:90 Days access
Downloadable:90 Days
$77.40
Online:120 Days access
Downloadable:120 Days
$92.88
Online:180 Days access
Downloadable:180 Days
$100.62
Online:1825 Days access
Downloadable:Lifetime Access
$154.80
*To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.
$100.62*

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare. Computer Viruses and Malware is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for advanced-level students in computer science.

Table of Contents

Dedication v
List of Figures xi
Preface xv
1. WE'VE GOT PROBLEMS
1(10)
1.1 Dramatis Personae
1(1)
1.2 The Myth of Absolute Security
2(1)
1.3 The Cost of Malware
3(1)
1.4 The Number of Threats
4(1)
1.5 Speed of Propagation
5(1)
1.6 People
6(1)
1.7 About this Book
7(1)
1.8 Some Words of Warning
7(4)
2. DEFINITIONS AND TIMELINE
11(16)
2.1 Malware Types
11(8)
2.1.1 Logic Bomb
12(1)
2.1.2 Trojan Horse
12(1)
2.1.3 Back Door
13(1)
2.1.4 Virus
14(1)
2.1.5 Worm
15(1)
2.1.6 Rabbit
16(1)
2.1.7 Spyware
16(1)
2.1.8 Adware
17(1)
2.1.9 Hybrids, Droppers, and Blended Threats
17(1)
2.1.10 Zombies
18(1)
2.2 Naming
19(2)
2.3 Authorship
21(1)
2.4 Timeline
22(5)
3. VIRUSES
27(26)
3.1 Classification by Target
28(6)
3.1.1 Boot-Sector Infectors
28(2)
3.1.2 File Infectors
30(3)
3.1.3 Macro Viruses
33(1)
3.2 Classification by Concealment Strategy
34(14)
3.2.1 No Concealment
34(1)
3.2.2 Encryption
35(2)
3.2.3 Stealth
37(1)
3.2.4 Oligomorphism
38(1)
3.2.5 Polymorphism
38(8)
3.2.6 Metamorphism
46(1)
3.2.7 Strong Encryption
47(1)
3.3 Virus Kits
48(5)
4. ANTI-VIRUS TECHNIQUES
53(44)
4.1 Detection: Static Methods
55(16)
4.1.1 Scanners
55(14)
4.1.2 Static Heuristics
69(1)
4.1.3 Integrity Checkers
70(1)
4.2 Detection: Dynamic Methods
71(8)
4.2.1 Behavior Monitors/Blockers
71(3)
4.2.2 Emulation
74(5)
4.3 Comparison of Anti-Virus Detection Techniques
79(1)
4.4 Verification, Quarantine, and Disinfection
80(5)
4.4.1 Verification
81(1)
4.4.2 Quarantine
82(1)
4.4.3 Disinfection
82(3)
4.5 Virus Databases and Virus Description Languages
85(3)
4.6 Short Subjects
88(9)
4.6.1 Anti-Stealth Techniques
88(1)
4.6.2 Macro Virus Detection
89(1)
4.6.3 Compiler Optimization
90(7)
5. ANTI-ANTI-VIRUS TECHNIQUES
97(12)
5.1 Retroviruses
97(2)
5.2 Entry Point Obfuscation
99(1)
5.3 Anti-Emulation
99(2)
5.3.1 Outlast
99(1)
5.3.2 Outsmart
100(1)
5.3.3 Overextend
100(1)
5.4 Armoring
101(4)
5.4.1 Anti-Debugging
101(2)
5.4.2 Anti-Disassembly
103(2)
5.5 Tunneling
105(1)
5.6 Integrity Checker Attacks
106(1)
5.7 Avoidance
106(3)
6. WEAKNESSES EXPLOITED
109(34)
6.1 Technical Weaknesses
109(25)
6.1.1 Background
110(3)
6.1.2 Buffer Overflows
113(10)
6.1.3 Integer Overflows
123(2)
6.1.4 Format String Vulnerabilities
125(2)
6.1.5 Defenses
127(5)
6.1.6 Finding Weaknesses
132(2)
6.2 Human Weaknesses
134(9)
6.2.1 Virus Hoaxes
136(7)
7. WORMS
143(14)
7.1 Worm History
144(4)
7.1.1 Xerox PARC, c. 1982
144(1)
7.1.2 The Internet Worm, November 1988
145(3)
7.2 Propagation
148(9)
7.2.1 Initial Seeding
149(1)
7.2.2 Finding Targets
150(7)
8. DEWORMING
157(20)
8.1 Defense
158(9)
8.1.1 User
158(1)
8.1.2 Host
158(5)
8.1.3 Perimeter
163(4)
8.2 Capture and Containment
167(5)
8.2.1 Honeypots
168(1)
8.2.2 Reverse Firewalls
169(1)
8.2.3 Throttling
170(2)
8.3 Automatic Countermeasures
172(5)
9. "APPLICATIONS"
177(12)
9.1 Benevolent Malware
177(1)
9.2 Spam
178(1)
9.3 Access-for-Sale Worms
179(2)
9.4 Cryptovirology
181(1)
9.5 Information Warfare
182(3)
9.6 Cyberterrorism
185(4)
10. PEOPLE AND COMMUNITIES 189(12)
10.1 Malware Authors
189(2)
10.1.1 Who?
189(1)
10.1.2 Why?
190(1)
10.2 The Anti-Virus Community
191(10)
10.2.1 Perceptions
192(1)
10.2.2 Another Day in Paradise
192(2)
10.2.3 Customer Demands
194(1)
10.2.4 Engineering
195(1)
10.2.5 Open Questions
196(5)
11. WHAT SHOULD WE DO? 201(4)
References 205(18)
Index 223

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.