THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] - نسخه متنی

Peter Szor

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











  • Index

    [SYMBOL]
    [A]
    [B]
    [C]
    [D]
    [E]
    [F]
    [G]
    [H]
    [I]
    [J]
    [K]
    [L]
    [M]
    [N]
    [O]
    [P]
    [Q]
    [R]
    [S]
    [T]
    [U]
    [V]
    [W]
    [X]
    [Y]
    [Z]

    F-PROT (antivirus program) 2nd 3rd 4th

    F1 key

    Help file viruses 2nd

    false positives

    integrity checking 2nd

    signatures

    FAT file systems

    cluster viruses 2nd 3rd

    Father Christmas (worm)

    Father Christmas worm 2nd

    FC (File Compare) 2nd

    Ferenc, Leitold

    Ferrie, Peter

    TLSDEMO program

    File Compare tool

    file extension dependency 2nd 3rd

    file format dependency 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

    file formats

    obfuscation

    file infection techniques
    [See infection techniques]

    File Monitor log

    file parsing attacks 2nd

    file stealth viruses 2nd 3rd

    file structure infection

    Win32

    file system dependency 2nd 3rd 4th

    file systems

    filter drivers

    file viruses

    generic disinfection methods 2nd

    hooking INT 21h (interrupt handler) 2nd 3rd 4th

    FileAlignment field (PE header)

    files

    goat (natural infection testing) 2nd

    IDA command script (IDC)

    images

    scanning

    monitoring 2nd

    Filler (virus) 2nd

    infection technique

    filter driver virus deactivation (memory scanning) 2nd 3rd

    filtering

    algorithmic scanning methods 2nd 3rd

    as process of computer virus analysis 2nd

    filters

    drivers

    fingerd program

    Morris worm attack against

    fingerprinting

    worm targets 2nd 3rd 4th 5th 6th

    Finnpoly (virus)

    firewalls 2nd 3rd 4th

    BlackIce

    first-generation antivirus scanners

    bookmarks 2nd

    entry-point scanning 2nd

    fixed-point scanning 2nd

    generic detection

    hashing 2nd

    hyperfast disk access

    mismatches

    string scanning 2nd 3rd

    top-and-tail scanning

    wildcards 2nd

    first-generation buffer overflows 2nd 3rd 4th

    definition of

    first-generation Windows 95 viruses 2nd 3rd

    FitzGerald, Nick

    fixed-point scanning

    first-generation antivirus scanners 2nd

    flags

    suspicious combinations of

    Flash

    ActionScript viruses 2nd

    Flash BIOS viruses 2nd

    Flip (virus)

    somewhat destructive payload viruses

    flirt signatures

    flooders

    definition of

    FluShot (antivirus program)

    Ford, Richard

    Form (virus)

    infection technique

    format specifiers

    format string attacks 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

    formatting

    extra sectors 2nd 3rd

    formula macros 2nd

    FPU instructions 2nd

    fractionated cavity viruses (infection technique) 2nd 3rd 4th 5th

    Franvir
    [See W32/Franvir (virus)]

    Fredkin, Edward

    self-replicating structures 2nd 3rd

    free() function

    FreeBSD/Scalper (worm)

    shellcode blocking

    Freitas, Robert A., Jr

    Frodo (virus)

    hook table 2nd

    interrupt hooking 2nd 3rd

    self-protection technique

    full-stealth file viruses

    full-stealth polymorphic viruses

    full-stealth viruses 2nd

    function

    GetProcAddress()

    function call-hooking (infection technique) 2nd 3rd

    function pointer overflows 2nd 3rd 4th

    functions

    direct library invocation detection 2nd 3rd

    execve()

    exporting 2nd

    free()

    KiUserExceptionDispatcher()

    LoadLibrary()

    malloc()

    NTDLL

    NtOpenThread()

    Object Manager

    OpenThread()

    run-time library (RTL)

    VirtualAlloc()

    VirtualProtectEx()

    Windows NT

    for kernel-mode memory scanning 2nd

    functionsGetProcAddress()

    future worm attacks 2nd 3rd 4th


  • / 191