Chapter 15. Malicious Code Analysis Techniques
Previous chapters have discussed the different antivirus defense strategies. This chapter gives a short introduction to malicious code analysis, which can provide invaluable information to the defender. Although some of the methods and tools were demonstrated previously, this chapter discusses some of their more interesting aspects.1 developed by IBM is discussed and compared to the process of manual analysis. |