THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] - نسخه متنی

Peter Szor

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











  • Index

    [SYMBOL]
    [A]
    [B]
    [C]
    [D]
    [E]
    [F]
    [G]
    [H]
    [I]
    [J]
    [K]
    [L]
    [M]
    [N]
    [O]
    [P]
    [Q]
    [R]
    [S]
    [T]
    [U]
    [V]
    [W]
    [X]
    [Y]
    [Z]

    e-mail

    executable code-based attacks

    HTML-based mail

    e-mail address harvesting (worms) 2nd 3rd 4th 5th 6th 7th

    e-mail addresses

    parsing files for

    e-mail attachment inserters

    worm infections

    e-mail attacks

    worm infections 2nd

    early warning systems

    early warnings

    information on

    Easter eggs

    definition of

    ecophagy

    Eddie (virus)

    self-protection technique

    Eddie-2 (virus)

    EICAR (European Institute for Computer Antivirus Research)

    ELF viruses 2nd

    Elk Cloner (virus) 2nd 3rd

    EMACS viruses

    embedded decryptor (infection technique) 2nd 3rd

    embedded decryptor and virus body (infection technique) 2nd 3rd

    embedded object insertion dependency 2nd

    emulation
    [See code emulation]

    antiemulation techniques (armored viruses) 2nd 3rd 4th 5th 6th

    encoding URLs 2nd

    encrypted viruses 2nd 3rd 4th 5th 6th 7th 8th 9th

    encryption 2nd 3rd 4th 5th 6th 7th 8th [See also decryption]

    Linux/Slapper worm

    of host file headers 2nd

    virus detection 2nd 3rd 4th 5th

    W95/Marburg virus

    X-RAY algorithmic scanning method 2nd 3rd 4th 5th

    entry point-obscuring polymorphic viruses

    entry points

    obfuscation

    random entry points in code section 2nd

    entry-point obscuring technique 2nd

    entry-point obscuring viruses (infection technique) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

    entry-point scanning

    first-generation antivirus scanners 2nd

    enumeration

    network enumeration attacks 2nd 3rd

    of network shares 2nd 3rd

    processes

    environments of malicious code 2nd 3rd

    archive format dependency 2nd

    compiler and linker dependency 2nd

    computer architecture dependency 2nd

    CPU dependency 2nd

    date and time dependency 2nd

    debugger dependency 2nd 3rd

    device translator layer dependency 2nd 3rd 4th 5th

    embedded object insertion dependency 2nd

    extension dependency 2nd 3rd

    file format dependency 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

    file system dependency 2nd 3rd 4th

    host size dependency 2nd

    interpreted environment dependency 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th

    JIT dependency 2nd 3rd

    multipartite viruses 2nd

    network protocol dependency

    operating system dependency 2nd

    operating system version dependency 2nd

    resource dependency 2nd

    self-contained environment dependency 2nd 3rd 4th

    source code dependency 2nd

    vulnerability dependency

    EPO (entry-point obscuring) viruses (infection technique) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

    EPO mechanism

    W32/Simile virus

    EPO viruses

    error detection and correction

    with Hamming code 2nd

    ESC sequences

    reconfiguring 2nd

    Etap.D (virus) 2nd

    ETG (executable trash generator) engine

    Ethereal

    Linux/Slapper (worm)

    W32/Aliz@mm (worm) captures

    W32/Blaster worms

    W32/Sasser.D (worm)

    ethics

    of using virus construction kits

    Etoh, Hiroaki

    European Institute for Computer Antivirus Research (EICAR)

    Evol (virus)

    code emulation

    evolution of macro viruses 2nd

    evolution of virus code 2nd

    exact identification 2nd 3rd

    Excel viruses
    [See macro viruses]

    exception handlers

    exception handling

    CodeRed worm 2nd

    exception-handler validation 2nd 3rd 4th

    exceptions

    generating

    structured exception handling 2nd

    EXE viruses 2nd

    Exebug (virus)

    execode

    macro viruses 2nd

    executable code-based attacks

    executable trash generator (ETG) engine

    executables

    linking DLLs to 2nd 3rd 4th

    executed images (Win32 viruses) 2nd 3rd

    ExecuteOnly attribute (Novell NetWare)

    attacks via 2nd 3rd 4th 5th

    execution

    random execution logic 2nd

    execution environments
    [See environments of malicious code]

    execve() function

    exploits
    [See blended attacks] [See vulnerability dependency]

    automated discovery 2nd

    definition of

    exploits W32/Slammer (worm) 2nd 3rd

    export table (PE files) 2nd

    exporting

    functions 2nd

    extended access lists

    Extended Memory Specification (XMS)

    extended tiny encryption algorithm (XTEA)

    extension dependency 2nd 3rd

    extensions

    kernel-mode 2nd

    subsystems 2nd

    extra disk sectors

    formatting 2nd 3rd


  • / 191