THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] - نسخه متنی

Peter Szor

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











  • Index

    [SYMBOL]
    [A]
    [B]
    [C]
    [D]
    [E]
    [F]
    [G]
    [H]
    [I]
    [J]
    [K]
    [L]
    [M]
    [N]
    [O]
    [P]
    [Q]
    [R]
    [S]
    [T]
    [U]
    [V]
    [W]
    [X]
    [Y]
    [Z]

    DAC (discretionary access control systems)

    Dark Angel (virus writer)

    PS-MPC virus construction kit

    Dark Avenger (virus writer)

    Commander_Bomber virus 2nd 3rd

    MtE (mutation engine) 2nd 3rd

    Number_Of_The_Beast virus

    Dark Avenger (virus)

    self-protection technique

    Dark_Avenger (virus)

    Dark_Avenger.1800.A (virus)

    self-protection technique

    Darkman (virus writer)

    W2K/Installer virus

    Darkness (virus)

    DarkParanoid (virus)

    memory scanning attacks

    Darth_Vader (virus)

    infection technique

    system buffer viruses

    Darwin (game)

    data

    versus code

    in von Neumann machines

    data diddler viruses 2nd

    Data Fellows

    Data Rescue's IDA
    [See IDA (disassembler)]

    data stealing viruses 2nd 3rd 4th 5th

    date and time dependency 2nd

    DBR (DOS BOOT record)

    infection techniques 2nd 3rd

    DCL viruses 2nd

    DDoS (distributed denial of service) attacks

    de Wit, Jan

    deactivation

    of filter driver viruses 2nd 3rd

    dead virus code

    reviving

    DEBUG command

    DEBUG command (sendmail)

    Morris worm

    debug interfaces

    tracing with 2nd

    debug registers

    clearing

    debugger dependency 2nd 3rd

    debuggers

    antidebugging techniques (armored viruses) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

    debugging 2nd 3rd 4th 5th

    DEC/VMS systems

    DCL viruses 2nd

    deception

    e-mail worm attacks 2nd

    decoders

    packets

    decryption [See also encryption]

    backward decryption

    disassemblers 2nd 3rd 4th 5th

    nonlinear decryption

    RDA viruses

    with stack pointer (SP)

    decryptors

    dynamic detection 2nd

    generic 2nd

    static detection 2nd 3rd

    tracking

    dedicated virus analysis systems

    installation of 2nd

    VMWARE 2nd

    DeepSight alerts

    Demon Emperor (virus writer)

    Hare virus 2nd

    Den_Zuko (virus)

    competition between viruses

    denial of service (DoS) attacks 2nd 3rd 4th

    Denzuko (virus)

    infection technique

    dependencies

    archive format dependency 2nd

    compiler and linker dependency 2nd

    computer architecture dependency 2nd

    CPU dependency 2nd

    date and time dependency 2nd

    debugger dependency 2nd 3rd

    device translator layer dependency 2nd 3rd 4th 5th

    embedded object insertion dependency 2nd

    extension dependency 2nd 3rd

    file format dependency 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

    file system dependency 2nd 3rd 4th

    host size dependency 2nd

    interpreted environment dependency 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th

    JIT dependency 2nd 3rd

    language dependency of macro viruses 2nd

    multipartite viruses 2nd

    network protocol dependency

    operating system dependency 2nd

    operating system version dependency 2nd

    platform dependency of macro viruses 2nd

    Registry-dependent viruses 2nd

    resource dependency 2nd

    self-contained environment dependency 2nd 3rd 4th

    source code dependency 2nd

    vulnerability dependency

    destructive payload viruses

    highly destructive payloads 2nd 3rd 4th 5th 6th 7th

    somewhat destructive payloads 2nd 3rd

    detection

    active viruses in memory

    cryptographic

    direct library function invocations 2nd 3rd

    dynamic decryptor 2nd

    engines

    first-generation antivirus scanners

    bookmarks 2nd

    entry-point scanning 2nd

    fixed-point scanning 2nd

    generic

    hashing 2nd

    hyperfast disk access

    mismatches

    string scanning 2nd 3rd

    top-and-tail scanning

    wildcards 2nd

    geometric 2nd

    injected code

    shellcode blocking 2nd 3rd 4th 5th 6th 7th 8th

    network intrusion detection system (NIDS) 2nd

    network-intrusion detection system (NIDS)

    second-generation antivirus scanners

    exact identification 2nd 3rd

    nearly-exact identification 2nd

    skeleton

    smart scanning 2nd

    static decryptor 2nd 3rd

    threads 2nd 3rd 4th

    device driver viruses 2nd

    device translator layer dependency 2nd 3rd 4th 5th

    devolution of macro viruses 2nd

    Dewdney, A.K

    dialers

    definition of

    dictionary attacks

    Digital Immune System 2nd 3rd

    Digital Millennium Copyright Act (DMCA)

    DIR-II (virus)

    direct library function invocations, detection of 2nd 3rd

    direct-action viruses 2nd

    directories

    page (memory)

    directory stealth viruses 2nd 3rd 4th

    dirty memory pages

    disassemblers

    antidisassembly techniques (armored viruses) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th

    malicious code analysis techniques 2nd 3rd 4th 5th

    disassembling techniques

    metamorphic virus detection 2nd

    discovery of automated exploits 2nd

    discretionary access control systems (DAC)

    disinfection
    [See antivirus programs]

    memory scanning 2nd

    loaded DLLs

    patching code in active pages 2nd

    process termination

    thread termination 2nd 3rd 4th

    disinfection methods 2nd 3rd 4th 5th [See also antivirus programs]

    generic decryptors 2nd

    heuristics for generic repair 2nd

    standard 2nd 3rd

    disk access

    with port I/O 2nd

    disk cache viruses 2nd 3rd

    Disk Killer (virus)

    infection technique

    Dispatch routine of DeactivatorDrivers

    distributed denial of service (DDoS) attacks

    divide-by-zero exceptions

    DLL viruses 2nd 3rd

    DLLs

    disinfecting

    linking to executables 2nd 3rd 4th

    DMCA (Digital Millennium Copyright Act)

    Donut (virus)

    Doomed (game)

    Doomjuice (worm)

    cooperation with viruses

    DOS

    behavior blocking

    cluster and sector-level stealth viruses 2nd 3rd

    COM viruses

    EPO (entry-point obscuring) viruses 2nd 3rd 4th 5th 6th 7th

    EXE viruses 2nd

    full-stealth viruses 2nd

    interrupt hooking 2nd 3rd 4th 5th

    on INT 13h (boot viruses) 2nd 3rd

    on INT 21h (file viruses) 2nd 3rd 4th

    memory-resident viruses

    installation 2nd 3rd

    self-detection techniques 2nd

    metamorphic viruses

    server function call

    system buffer viruses

    TSR (Terminate-and-Stay-Resident) programs 2nd

    undocumented interrupt (Int 21h/52h function)

    DoS (denial of service) attacks 2nd 3rd 4th

    DoS attacks

    against Windows Update Web site

    DOS BOOT record (DBR)

    infection techniques 2nd 3rd

    DOS stub

    in PE header

    "double extensions"

    down-conversion

    of macro viruses 2nd

    downloaders

    definition of

    Doxtor L (virus writer)

    W32/Idele virus

    DR. DR. STROBE & PAPA HACKER (virus writer)

    Dream (virus)

    driver-list scanning

    detecting debuggers

    drivers

    filter

    filter driver virus deactivation (memory scanning) 2nd 3rd

    kernel-mode

    lists of

    droppers

    definition of 2nd

    Dukakis (virus) 2nd

    Dumaru (worm) 2nd

    dumps

    PEDUMP

    strings 2nd

    Dustbin

    Dwarf (Core War warrior program) 2nd

    dynamic analysis techniques 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

    dynamic decryptor detection 2nd

    dynamic heuristics

    dynamic link library viruses 2nd 3rd

    dynamically allocated memory
    [See heaps]


  • / 191