THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] - نسخه متنی

Peter Szor

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











  • Index

    [SYMBOL]
    [A]
    [B]
    [C]
    [D]
    [E]
    [F]
    [G]
    [H]
    [I]
    [J]
    [K]
    [L]
    [M]
    [N]
    [O]
    [P]
    [Q]
    [R]
    [S]
    [T]
    [U]
    [V]
    [W]
    [X]
    [Y]
    [Z]

    Cabanas
    [See W32/Cabanas (virus)]

    cache bypass vulnerability

    W32/Blebla worm

    cache viruses
    [See disk cache viruses]

    calc.exe

    CALL-to-POP trick 2nd

    calls

    system tracing 2nd

    canonicalization 2nd

    captures

    Linux/Slapper (worm) 2nd 3rd

    network traffic

    W32/Blaster (worm) 2nd

    W32/Sasser.D (worm)

    W32/Slammer (worm) 2nd 3rd

    W32/Welchia (worm)

    CARO

    (Computer Antivirus Researchers Organization)

    Cascade (virus) 2nd 3rd 4th

    nondestructive payload viruses

    self-protection technique 2nd

    X-RAY scanning

    cavity viruses (infection technique) 2nd 3rd

    CBAC (context-based access control)

    CC hack

    CEF file format 2nd

    cell phones

    worms on 2nd 3rd

    cellular automata [See also self-replicating systems]

    Edward Fredkin structures 2nd 3rd

    game of Life (Conway) 2nd 3rd 4th 5th 6th

    cellular automata (CA) computer architecture

    chain letters

    definition of 2nd

    changed objects

    integrity checking

    Characteristics field (PE header)

    check bytes
    [See bookmarks]

    checksum

    API strings

    as self-protection technique 2nd

    CRC checksum

    detecting break points 2nd

    recalculation 2nd

    Checksum field (PE header)

    Cheeba (virus)

    self-protection technique

    Cheese (worm

    Chess, Dave 2nd

    Cheswick, Bill

    Chi, Darren

    CHRISTMA EXEC worm 2nd

    Cisco

    routers [See also routers]

    classic parasitic viruses (infection technique) 2nd 3rd

    clean initial states

    integrity checking

    cleaning

    goat files

    Clementi, Andreas

    cluster prepender infection method

    cluster viruses

    file system dependency 2nd 3rd

    cluster-level stealth viruses 2nd 3rd

    CMOS viruses

    Codd, E.F

    code

    in active pages

    patching 2nd

    injected code detection

    shellcode blocking 2nd 3rd 4th 5th 6th 7th 8th

    malicious code analysis techniques

    architecture guides

    collection maintenance 2nd

    dedicated system installation 2nd

    Digital Immune System 2nd 3rd

    disassemblers 2nd 3rd 4th 5th

    dynamic analysis techniques 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

    knowledge bases 2nd

    process of 2nd 3rd 4th 5th 6th 7th 8th

    unpacking 2nd

    Virus Analysis Toolkit (VAT) 2nd

    VMWARE 2nd

    quick examination of as process of computer virus analysis

    self-sending code blocking 2nd 3rd 4th 5th

    versus data

    in von Neumann machines

    code builders (infection technique) 2nd 3rd

    code confusion
    [See obfuscated code]

    code emulation 2nd 3rd 4th

    dynamic decryptor detection 2nd

    encrypted/polymorphic virus detection 2nd 3rd 4th 5th

    metamorphic virus detection 2nd 3rd 4th 5th

    code emulation-based tunneling

    code evolution 2nd

    code injection attacks 2nd 3rd 4th

    CodeRed worm 2nd 3rd 4th

    code integration

    W95/Zmist virus 2nd

    code integration viruses (infection technique) 2nd 3rd

    code propagation techniques (worms)

    code injection attacks 2nd 3rd

    executable code-based attacks

    HTML-based mail

    links to Web sites or proxies 2nd 3rd

    remote login-based attacks 2nd

    shell code-based attacks 2nd 3rd 4th 5th

    code redirection

    code reviews

    buffer overflow attacks (worms)

    code section

    random entry point 2nd

    code sections

    naming

    packing 2nd

    PE entry points

    sizes in header

    writeable flag

    CodeGreen (worm)

    competition between worms 2nd

    CodeRed (virus)

    CodeRed (worm) 2nd

    avoiding buffer overflow attacks

    competition between worms 2nd

    computer security versus antivirus programs

    detailed description of 2nd 3rd 4th

    history of blended attacks

    stack buffer overflows

    system modification attacks

    CodeRed_II (worm)

    Cohen, Fred

    Cohen, Frederic 2nd 3rd

    Cohen, Frederick

    definition of computer viruses 2nd

    history of antivirus programs

    Coke
    [See W32/Coke (virus)]

    collection (viruses) maintenance 2nd

    COM viruses

    combined attacks
    [See blended attacks]

    Commander_Bomber (virus)

    infection technique 2nd 3rd

    companion viruses

    companion viruses (infection technique)

    competition between viruses 2nd 3rd

    compiler alignment areas

    recycling

    compiler dependency 2nd

    compiler-level solutions

    buffer overflow attacks (worms) 2nd

    Microsoft Visual .NET 2003 (7.0 & 7.1) 2nd 3rd 4th

    ProPolice 2nd 3rd

    StackGuard 2nd 3rd 4th

    compressing viruses (infection technique) 2nd 3rd

    compression

    as self-protection technique 2nd 3rd 4th

    PE file-infection techniques 2nd

    compression viruses

    file system dependency

    Computer Antivirus Researchers Organization (CARO)

    computer architecture dependency 2nd

    computer security companies

    versus antivirus programs 2nd

    computer simulations of nature
    [See nature-simulation games]

    computer virus analysis, process of 2nd 3rd 4th 5th 6th 7th 8th

    computer virus research

    art versus science

    author's start in 2nd 3rd

    common patterns 2nd

    computer viruses

    code evolution 2nd

    definition of 2nd 3rd

    history of 2nd 3rd

    infection techniques
    [See infection techniques]

    interactions

    competition 2nd 3rd

    cooperation 2nd 3rd

    sexual reproduction

    SWCP (simple worm communication protocol)

    modeling virus infections 2nd

    naming conventions 2nd

    !*vendor-specific_comment&

    #*packer&

    *family_name& 2nd

    *infective_length&

    *malware_type&://

    *modifiers&

    *platform&/ 2nd 3rd 4th 5th 6th

    *variant&

    .*group_name&

    :*locale_specifier&

    @m

    @mm

    [*devolution&]

    retro viruses

    terminology 2nd 3rd 4th 5th 6th

    versus worms

    computer worms
    [See worms]

    computers

    modeling virus infections 2nd

    connections [See also network-level defense strategies]

    worm blocking techniques 2nd

    construction kits
    [See virus construction kits]

    contagion worms

    context-based access control (CBAC)

    control transfer

    with APIs 2nd

    Conway, John Horton

    game of Life 2nd 3rd 4th 5th 6th

    cookies

    security_cookie values

    cooperation between viruses 2nd 3rd

    coprocessor instructions 2nd

    copy-protection software

    extra disk sectors

    copycat worms [See also worm blocking techniques]

    Core War (game) 2nd 3rd 4th

    Core Wars

    Core Wars instructures (1994 revision)

    Corel Script viruses 2nd

    corruption

    of macro viruses 2nd

    counterattacks

    CPU dependency 2nd

    CPU instructions

    undocumented

    CPUs

    Win32 platform support

    CR0 control registers

    CRC checksums

    CreateFile() API 2nd

    CreateProcess() API

    Creeper (virus)

    cross-platform binary viruses

    Cruncher (virus)

    infection technique

    Crypto API

    cryptographic detection

    cryptography

    AIDS TROJAN DISK Trojan horse

    Cryptor (virus)

    self-protection technique

    Csakany, Antal

    CSC/CSV (virus)

    CSC/PVT (virus)


  • / 191