By Erez Metula

Managed Code Rootkits is the 1st ebook to hide application-level rootkits and different different types of malware contained in the program VM, which runs a platform-independent programming surroundings for methods. The publication, divided into 4 elements, issues out high-level assaults, that are constructed in intermediate language.

The preliminary a part of the booklet bargains an summary of controlled code rootkits. It explores surroundings versions of controlled code and the connection of controlled code to rootkits by way of learning how they use program VMs. It additionally discusses attackers of controlled code rootkits and diverse assault eventualities. the second one a part of the e-book covers the advance of controlled code rootkits, beginning with the instruments utilized in generating controlled code rootkits via their deployment.

The subsequent half specializes in countermeasures that may in all likelihood be used opposed to controlled code rootkits, together with technical strategies, prevention, detection, and reaction strategies. The e-book concludes by means of proposing suggestions which are someway just like controlled code rootkits, which are utilized in fixing difficulties.

  • Named a 2011 top Hacking and Pen checking out publication through InfoSec Reviews
  • Introduces the reader in short to controlled code environments and rootkits in general
  • Completely information a brand new form of rootkit hiding within the program point and demonstrates how a hacker can switch language runtime implementation
  • Focuses on controlled code together with Java, .NET, Android Dalvik and reports malware improvement scanarios

Show description

Read Online or Download Managed Code Rootkits: Hooking into Runtime Environments PDF

Similar business information technology books

Security Metrics Management: How to Manage the Costs of an Assets Protection Program

Protection metrics is the appliance of quantitative, statistical, and/or mathematical analyses to measuring protection sensible tendencies and workload. In different phrases, monitoring what each one functionality is doing by way of point of attempt (LOE), expenses, and productiveness. protection metrics administration is the handling of an resources security software and comparable protection capabilities by utilizing metrics.

Dealing with Dilemmas: Where Business Analytics Fall Short

Gazing how enterprise administration is keen about research and numbers, facing Dilemmas indicates there's a whole category of difficulties that can not be solved via research: company dilemmas. Dilemmas, representing a wide a part of strategic decision-making, require the other process of research; synthesis.

The CIO Playbook: Strategies and Best Practices for IT Leaders to Deliver Value (Wiley CIO)

As our financial system shifts from recession to restoration, our present economic system is ripe for transformation. CIOs are in a special place to leverage know-how to be able to force innovation and enhance enterprise development. The CIO Playbook is the convenient table reference for CIOs, CEOs, CFOs, and up and coming leaders, revealing a dynamic seven-step framework (Partner – manage – Innovate – bring – help – shield – develop) that might advisor you in making crucial alterations on your association.

Formal SQL Tuning for Oracle Databases: Practical Efficiency - Efficient Practice

The objective of  SQL tuning is  the development of the present execution plan.  The authors talk about the removing of brakes within the execution plan. Such "brakes" or bottlenecks may be famous through a proper research of the execution plan. For this goal no information version wisdom is required. this is often particularly useful for database directors simply because they're often now not or insufficiently  familiar with the information version.

Extra resources for Managed Code Rootkits: Hooking into Runtime Environments

Sample text

Download PDF sample

Rated 4.55 of 5 – based on 45 votes