Description |
1 online resource (xiii, 316 pages) : illustrations |
Bibliography |
Includes bibliographical references and index. |
Summary |
"Introduces the reader briefly to managed code environments and rootkits in general--Completely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change language runtime implementation--Focuses on managed code including Java, .Net, Android Dalvik, and reviews malware development scenarios"--Provided by publisher. |
Contents |
Front Cover; Managed Code Rootkits; Copyright; Table of Contents; Acknowledgements; About the Author; Part I: Overview; Chapter 1. Introduction; Chapter 2. Managed Code Rootkits; Part II: Malware Development; Chapter 3. Tools of the Trade; Chapter 4. Runtime Modification; Chapter 5. Manipulating the Runtime; Chapter 6. Extending the Language with a Malware API; Chapter 7. Automated Framework Modification; Chapter 8. Advanced Topics; Part III: Countermeasures; Chapter 9. Defending against MCRs; Part IV: Where Do We Go from Here?; Chapter 10. Other Uses of Runtime Modification; Index. |
Subject |
Common Language Runtime.
|
|
Common Language Runtime |
|
Computers -- Access control.
|
|
Virtual computer systems -- Security measures.
|
|
Rootkits (Computer software)
|
|
Computer security.
|
|
Ordinateurs -- Accès -- Contrôle. |
|
Systèmes virtuels (Informatique) -- Sécurité -- Mesures. |
|
Trousses administrateur pirate. |
|
Sécurité informatique. |
|
Computer security |
|
Computers -- Access control |
|
Rootkits (Computer software) |
Other Form: |
Print version: Metula, Erez. Managed code rootkits. Amsterdam ; Boston : Syngress, ©2011 9781597495745 (DLC) 2010036631 (OCoLC)635451806 |
ISBN |
9781597495752 (electronic bk.) |
|
1597495751 (electronic bk.) |
|
9781282880092 (online) |
|
1282880098 |
|