THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] - نسخه متنی

Peter Szor

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











  • Index

    [SYMBOL]
    [A]
    [B]
    [C]
    [D]
    [E]
    [F]
    [G]
    [H]
    [I]
    [J]
    [K]
    [L]
    [M]
    [N]
    [O]
    [P]
    [Q]
    [R]
    [S]
    [T]
    [U]
    [V]
    [W]
    [X]
    [Y]
    [Z]

    Ma, Albert

    MAC (mandatory access control)

    MAC OS X

    shell scripts

    Machine field (PE header)

    Macintosh platform

    resource-dependent viruses 2nd

    Macro Identification and Resemblance Analyzer (MIRA)

    macro viruses 2nd 3rd 4th 5th 6th

    corruption 2nd

    evolution and devolution 2nd

    formula macros 2nd

    in Lotus Word Pro 2nd

    infecting user macros

    language dependency 2nd

    Lotus 1-2-3 2nd

    multipartite infection strategy 2nd

    naming conventions

    platform dependency 2nd

    source code, p-code, execode 2nd

    up-conversion and down-conversion 2nd

    XML 2nd

    macros

    integrity checking

    Magic field (PE header)

    Magistr (worm)

    SMTP-based attacks

    mailers

    definition of

    naming conventions

    maintenance

    virus collection 2nd

    malicious code analysis techniques

    architecture guides

    collection maintenance 2nd

    dedicated system installation 2nd

    Digital Immune System 2nd 3rd

    disassemblers 2nd 3rd 4th 5th

    dynamic analysis techniques 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

    knowledge bases 2nd

    process of 2nd 3rd 4th 5th 6th 7th 8th

    unpacking 2nd

    Virus Analysis Toolkit (VAT) 2nd

    VMWARE 2nd

    malicious programs
    [See computer viruses]

    malloc() function

    malware
    [See computer viruses]

    management

    memory 2nd

    Virtual Memory Manager

    mandatory access control (MAC)

    MapInfo viruses 2nd

    MARS (Memory Array Redcode Simulator)

    Martin, Edwin

    Marx, Andreas

    mass-mailer worms (@mm worms)

    definition of

    mass-mailers

    naming conventions

    Master Boot Record (MBR)

    master boot record (MBR)

    infection techniques 2nd 3rd

    matching

    patterns

    mathematical model for computer viruses

    MBR (Master Boot Record)

    MBR (master boot record)

    infection techniques 2nd 3rd

    McAfee SCAN (antivirus program)

    MCB (memory control block) 2nd

    MDEF viruses

    Memorial
    [See W95/Memorial (virus)]

    memory

    buffer overflow attacks
    [See buffer overflow attacks]

    dirty memory pages

    dynamically allocated memory
    [See heaps]

    management

    read-only kernel

    video memory

    checking

    VMM memory area

    Memory Array Redcode Simulator (MARS)

    memory control block (MCB) 2nd

    Memory Manager

    paging 2nd 3rd

    memory residency strategies

    direct-action viruses 2nd

    in-memory injectors over networks

    kernel mode, viruses in 2nd 3rd 4th 5th

    memory-resident viruses 2nd

    disk cache and system buffer viruses 2nd 3rd

    installation under DOS 2nd 3rd

    interrupt hooking 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

    self-detection techniques 2nd

    stealth viruses 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th

    processes, viruses in 2nd

    swapping viruses 2nd

    temporary memory-resident viruses 2nd

    memory scanning 2nd

    attacks 2nd

    detecting debuggers

    disinfection 2nd

    loaded DLLs

    patching code in active pages 2nd

    process termination

    thread termination 2nd 3rd 4th

    for interrupt handler 2nd

    in kernel mode

    64-bit platforms 2nd 3rd

    classes of context 2nd

    filter driver virus deactivation 2nd 3rd

    read-only memory

    upper 2G of address space

    user address space of processes

    Windows NT functions 2nd

    Windows NT service API entry points 2nd

    in user mode 2nd 3rd

    executed images (Win32 viruses) 2nd 3rd

    hidden window procedure (Win32 viruses)

    native Windows NT service viruses

    NtQuerySystemInformation() (NtQSI) 2nd 3rd

    processes/rights 2nd

    Win32 viruses 2nd 3rd 4th

    paging 2nd 3rd

    Windows NT virtual memory system 2nd 3rd 4th

    address spaces 2nd 3rd 4th 5th 6th 7th

    memory-resident viruses 2nd

    disk cache and system buffer viruses 2nd 3rd

    installation under DOS 2nd 3rd

    interrupt hooking 2nd 3rd 4th 5th

    on INT 13h (boot viruses) 2nd 3rd

    on INT 21h (file viruses) 2nd 3rd 4th

    self-detection techniques 2nd

    stealth viruses 2nd

    cluster and sector-level stealth viruses 2nd 3rd

    full-stealth viruses 2nd

    hardware-level stealth viruses 2nd 3rd

    read stealth viruses 2nd 3rd 4th 5th

    semistealth viruses 2nd 3rd 4th

    Mental Driller (virus writer)

    Simile.D virus

    W32/Simile virus

    Merkle, Ralph C

    Merry Xmas (virus)

    Metal Driller (virus writer)

    W95/Drill virus

    metamorphic virus detection

    code emulation 2nd 3rd 4th 5th

    disassembling techniques 2nd

    geometric detection 2nd

    metamorphic viruses 2nd 3rd 4th

    complex permutation techniques 2nd 3rd 4th 5th

    host application mutation 2nd

    MSIL metamorphic viruses 2nd

    simple permutation techniques 2nd 3rd 4th

    W32/Simile virus 2nd 3rd 4th 5th 6th 7th 8th 9th

    W95/Zmist virus 2nd 3rd 4th 5th

    metamorphic worms 2nd

    MetaPHOR (virus engine)

    MICE (Core War warrior program)

    Michelangelo (virus)

    Microsoft .NET
    [See .NET]

    Microsoft IIS servers

    W32/Nimda.A@mm worm 2nd

    Microsoft Security Bulletin MS03-007

    Microsoft SQL Server 2000

    W32/Slammer worm

    Microsoft SQL Servers

    exploits

    blocking 2nd 3rd

    Microsoft Visual .NET 2003 (7.0 & 7.1) 2nd 3rd 4th

    Microsoft Xbox

    security vulnerabilities

    MIME types 2nd

    W32/Badtrans.B@mm worm 2nd

    W32/Nimda.A@mm worm 2nd

    MIRA (Macro Identification and Resemblance Analyzer)

    mIRC

    instant messaging viruses 2nd

    mismatches

    first-generation antivirus scanners

    Mistfall engine

    mitigation

    return-to-LIBC attacks 2nd 3rd 4th

    mixed techniques
    [See blended attacks]

    MMX instructions 2nd

    mobile phones

    worms on 2nd 3rd

    modeling virus infections 2nd

    mathematical model

    modes

    kernel

    64-bit platform memory scanning 2nd 3rd

    classes of context (memory scanning) 2nd

    filter driver virus deactivation (memory scanning) 2nd 3rd

    memory scanning in

    read-only memory

    upper 2G of address space (memory scanning)

    user address space of processes

    Windows NT functions (memory scanning) 2nd

    Windows NT service API entry points (memory scanning) 2nd

    modification

    to files (tracking) 2nd

    modules

    altering

    logging

    Mole virus
    [See W32/IKX (virus)]

    monitoring

    files 2nd

    malicious code 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

    ports

    processes

    registries

    threads

    Monxla (virus)

    Morris (worm) 2nd 3rd 4th

    avoiding buffer overflow attacks

    blocking buffer overflow attacks

    copycat Linux/ADM worm 2nd

    detailed description of 2nd 3rd 4th

    history of blended attacks 2nd

    shellcode blocking

    weak passwords

    Morris Internet worm

    Morris, Robert, Sr

    Core War

    Mosquitos game

    logic bomb in

    MPB/Kynel (virus)

    Mr. Sandman (virus writer)

    Anti-AVP virus

    MSAV (antivirus program)

    MSIL metamorphic viruses 2nd

    MSIL/Gastropod (virus)

    self-protection technique 2nd 3rd

    MSIL/Impanate (virus)

    self-protection technique

    MtE (mutation engine) 2nd 3rd

    MtE (Mutation Engine)

    MtE mutation engine

    static decryptor detection

    multipartite infection strategy

    macro viruses 2nd

    multipartite viruses 2nd

    multiple PE headers

    multiple virus sections 2nd

    multiple-fork support (NTFS)

    multithreaded viruses

    Murkry (virus writer) 2nd

    Murkry (virus)

    infection technique

    mutation
    [See corruption]

    mutation engine (MtE) 2nd

    Mutation Engine (MtE)

    mutation engine (MtE)

    Muttik, Igor 2nd

    metamorphic viruses

    MX queries

    and SMTP-based worm attacks 2nd

    Mydoom (virus)

    cooperation with worms

    Mydoom (worm)

    SMTP-based attacks with MX queries

    Myname
    [See OS2/Myname (virus)]


  • / 191