THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] - نسخه متنی

Peter Szor

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











  • Index

    [SYMBOL]
    [A]
    [B]
    [C]
    [D]
    [E]
    [F]
    [G]
    [H]
    [I]
    [J]
    [K]
    [L]
    [M]
    [N]
    [O]
    [P]
    [Q]
    [R]
    [S]
    [T]
    [U]
    [V]
    [W]
    [X]
    [Y]
    [Z]

    ABAP viruses

    ABAP/Rivpas (virus)

    access

    context-based access control (CBAC)

    counterattacks

    Dumaru (worm)

    early warning systems

    firewalls 2nd 3rd 4th

    honeypot systems 2nd 3rd

    network intrusion detection system (NIDS) 2nd

    router access lists 2nd 3rd

    worm behavior patterns 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

    access control lists (ACLs)

    access control systems 2nd

    accidentally destructive payload viruses

    ACG (Amazing Code Generator) virus

    ACG (virus)

    code emulation 2nd

    disassembling

    heuristics

    self-protection technique

    ACLs (access control lists)

    Acrobat

    PDF viruses 2nd

    ActionScript viruses 2nd

    activation methods
    [See payload activation]

    active instructions

    tracking

    active pages, patching code in 2nd

    ActiveX control rights verification

    ActiveX controls

    safe-for-scripting 2nd

    safe-for-scripting controls

    VBS/BubbleBoy worm 2nd

    W32/Blebla worm 2nd

    address

    virtual address spaces (Windows NT) 2nd 3rd 4th 5th 6th 7th

    Address Resolution Protocol (ARP) requests

    address-book worms

    addresses

    GOT/IAT page attributes

    spaces

    process randomization

    return-to-LIBC attacks 2nd 3rd 4th

    upper 2G of address space (memory scanning)

    user address space of processes (scanning)

    virtual

    translation of

    AddressOfEntryPoint field (PE header)

    Adleman, Leonard

    ADM (worm)

    avoiding buffer overflow attacks

    administration

    memory 2nd

    Virtual Memory Manager

    Admiral Bailey (virus writer)

    IVP (Instant Virus Production Kit)

    Adobe Acrobat

    PDF viruses 2nd

    Adore (rootkit)

    Advanced Heuristic Disinfector (AHD)

    adware

    definition of 2nd

    AHD (Advanced Heuristic Disinfector)

    AIDS Information Diskette (Trojan horse)

    AIDS TROJAN DISK (Trojan horse)

    Alcopaul (virus writer)

    W32/Sand.12300 virus

    alerts

    DeepSight

    algorithmic detection

    metamorphic viruses

    algorithmic scanning methods 2nd 3rd

    filtering 2nd 3rd

    static decryptor detection 2nd 3rd

    X-RAY method 2nd 3rd 4th 5th

    algorithms

    Boyer-Moore

    Aliz (worm)

    ALS/Burstead (virus)

    altering module

    Amazing Code Generator (ACG) virus

    AmiPro viruses 2nd

    Amoeba (infection technique) 2nd

    analysis

    malicious code analysis techniques

    architecture guides

    collection maintenance 2nd

    dedicated system installation 2nd

    Digital Immune System 2nd 3rd

    disassemblers 2nd 3rd 4th 5th

    dynamic analysis techniques 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

    knowledge bases 2nd

    process of 2nd 3rd 4th 5th 6th 7th 8th

    unpacking 2nd

    Virus Analysis Toolkit (VAT) 2nd

    VMWARE 2nd

    Anarchy.6093 (virus)

    ANIMAL (game)

    "Anna Kornikova" virus

    Anna Kournikova virus

    ANSI.SYS drivers

    reconfiguring key functions 2nd

    Anthrax (virus)

    Anti-AVP (virus)

    self-protection technique

    ANTI-VIR.DAT file (antivirus program)

    AntiCMOS (virus)

    antidebugging techniques (armored viruses) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

    antidisassembly techniques (armored viruses) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th

    antiemulation techniques (armored viruses) 2nd 3rd 4th 5th 6th

    AntiEXE (virus)

    somewhat destructive payload viruses

    antigoat techniques (armored viruses) 2nd

    antiheuristics techniques (armored viruses) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

    AntiPascal (virus)

    antivirus defense techniques 2nd

    antivirus programs [See also disinfection methods]

    "Are you there?" calls

    behavior-blocking programs

    half-cooked repairs

    history of 2nd

    integrity checker programs

    modeling virus infections 2nd

    scanning

    versus computer security companies 2nd

    antivirus software

    disabling with retroviruses 2nd 3rd

    testers

    vendor contact information

    antivirus viruses

    API hooking (infection technique) 2nd 3rd

    API strings 2nd

    APIs

    control transfer 2nd

    AplS/Simpsons@mm (worm)

    APM/Greenstripe (virus)

    appending viruses

    CALL-to-POP trick 2nd

    appending viruses (infection technique) 2nd 3rd 4th 5th 6th

    AppleScript viruses 2nd

    application rights verification

    applications

    algorithmic scanning methods 2nd 3rd

    filtering 2nd 3rd

    static decryptor detection 2nd 3rd

    X-RAY method 2nd 3rd 4th 5th

    antivirus defense techniques 2nd

    code emulation 2nd 3rd 4th

    dynamic decryptor detection 2nd

    encrypted/polymorphic virus detection 2nd 3rd 4th 5th

    disinfection methods 2nd 3rd 4th

    generic decryptors 2nd

    heuristics for generic repair 2nd

    standard 2nd 3rd

    first-generation antivirus scanners

    bookmarks 2nd

    entry-point scanning 2nd

    fixed-point scanning 2nd

    generic detection

    hashing 2nd

    hyperfast disk access

    mismatches

    string scanning 2nd 3rd

    top-and-tail scanning

    wildcards 2nd

    heuristic analysis

    of 32-bit Windows viruses 2nd 3rd 4th 5th 6th

    using neural networks 2nd 3rd

    metamorphic virus detection

    code emulation 2nd 3rd 4th 5th

    disassembling techniques 2nd

    geometric detection 2nd

    second-generation antivirus scanners

    exact identification 2nd 3rd

    nearly-exact identification 2nd

    skeleton detection

    smart scanning 2nd

    viruses

    access control systems 2nd

    behavior blocking 2nd 3rd 4th

    inoculation 2nd

    integrity checking 2nd 3rd 4th

    sand-boxing 2nd

    architecture dependency
    [See computer architecture dependency]

    architecture guides, malicious code analysis techniques

    archive format dependency 2nd

    "Are you there?" calls (self-detection techinque)

    arenas (sections of memory)

    armored viruses

    antidebugging techniques 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

    antidisassembly techniques 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th

    antiemulation techniques 2nd 3rd 4th 5th 6th

    antigoat techniques 2nd

    antiheuristics techniques 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

    ARP (Address Resolution Protocol) requests

    art

    versus science

    "Art of the Fugue" (Bach)

    ASPACK (run-time packer)

    Atkinson, Bill

    attachment inserters

    worm infections

    attacks

    against memory scanning 2nd

    algorithmic scanning methods 2nd 3rd

    filtering 2nd 3rd

    static decryptor detection 2nd 3rd

    X-RAY method 2nd 3rd 4th 5th

    antivirus defense techniques 2nd

    blended attacks
    [See blended attacks]

    buffer overflow attacks
    [See buffer overflow attacks]

    code emulation 2nd 3rd 4th

    dynamic decryptor detection 2nd

    encrypted/polymorphic virus detection 2nd 3rd 4th 5th

    code injection attacks 2nd 3rd 4th

    dictionary attacks

    DoS

    DoS (denial of service) attacks 2nd

    e-mail worm attacks 2nd

    executable code-based attacks

    file parsing attacks 2nd

    first-generation antivirus scanners

    bookmarks 2nd

    entry-point scanning 2nd

    fixed-point scanning 2nd

    generic detection

    hashing 2nd

    hyperfast disk access

    mismatches

    string scanning 2nd 3rd

    top-and-tail scanning

    wildcards 2nd

    future 2nd 3rd 4th

    heuristic analysis

    of 32-bit Windows viruses 2nd 3rd 4th 5th 6th

    using neural networks 2nd 3rd

    injected code detection

    shellcode blocking 2nd 3rd 4th 5th 6th 7th 8th

    instant messaging attacks 2nd

    Linux/Slapper

    metamorphic virus detection

    code emulation 2nd 3rd 4th 5th

    disassembling techniques 2nd

    geometric detection 2nd

    network share enumeration 2nd 3rd

    network-level defense strategies 2nd

    counterattacks

    early warning systems

    firewalls 2nd 3rd 4th

    honeypot systems 2nd 3rd

    network intrusion detection system (NIDS) 2nd

    router access lists 2nd 3rd

    worm behavior patterns 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

    NNTP attacks

    password-capturing attacks

    peer-to-peer network attacks 2nd

    phishing attacks 2nd 3rd

    remote login-based attacks 2nd

    return-to-LIBC 2nd 3rd 4th 5th

    second-generation antivirus scanners

    exact identification 2nd 3rd

    nearly-exact identification 2nd

    skeleton detection

    smart scanning 2nd

    shell code-based attacks 2nd 3rd 4th 5th

    SMTP proxy-based attacks 2nd 3rd

    SMTP-based attacks 2nd 3rd 4th 5th 6th

    stack smashing

    vampire attacks

    worms [See also worm blocking techniques]

    attributes

    GOT/IAT page

    authenticated updates

    worm infections 2nd 3rd 4th 5th 6th 7th

    auto-rooters

    definition of

    AutoLisp viruses 2nd

    automata 2nd [See also cellular automata] [See also self-replicating systems]

    automated analysis, Digital Immune System 2nd 3rd

    automated exploit discovery 2nd

    AUTORUN.INF file viruses 2nd

    AV-Test.org

    AVP (antivirus software)

    Azusa (virus)

    infection technique


  • / 191