Casey et al., 2008 - Google Patents
Malware forensics: investigating and analyzing malicious codeCasey et al., 2008
- Document ID
 - 13588911429922930324
 - Author
 - Casey E
 - Malin C
 - Aquilina J
 - Publication year
 
External Links
Snippet
Malware Forensics: Investigating and Analyzing Malicious Code covers the complete  process of responding to a malicious code incident. Written by authors who have  investigated and prosecuted federal malware cases, this book deals with the emerging and … 
    - 238000000034 method 0 abstract description 347
 
Classifications
- 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/55—Detecting local intrusion or implementing counter-measures
 - G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
 - G06F21/562—Static detection
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
 - G06F21/577—Assessing vulnerabilities and evaluating computer system security
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/60—Protecting data
 - G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
 - G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
 - G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
 - G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/55—Detecting local intrusion or implementing counter-measures
 - G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F2221/2101—Auditing as a secondary aspect
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
 - H04L63/1425—Traffic logging, e.g. anomaly detection
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
 - G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1433—Vulnerability analysis
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F11/00—Error detection; Error correction; Monitoring
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1441—Countermeasures against malicious traffic
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F9/00—Arrangements for programme control, e.g. control unit
 - G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
 - H04L63/0227—Filtering policies
 
 
Similar Documents
| Publication | Publication Date | Title | 
|---|---|---|
| Casey et al. | Malware forensics: investigating and analyzing malicious code | |
| Talukder et al. | A survey on malware detection and analysis tools | |
| Carvey | Windows forensic analysis DVD toolkit | |
| Malin et al. | Malware forensics field guide for Windows Systems: Digital forensics field guides | |
| Kendall et al. | Practical malware analysis | |
| Talukder | Tools and techniques for malware detection and analysis | |
| Kara | A basic malware analysis method | |
| Lin et al. | Introductory computer forensics | |
| Case et al. | Hooktracer: Automatic detection and analysis of keystroke loggers using memory forensics | |
| Chayal et al. | A review on spreading and forensics analysis of windows-based ransomware | |
| Kara | Cyber-espionage malware attacks detection and analysis: A case study | |
| Chaithanya et al. | Detecting ransomware attacks distribution through phishing URLs Using Machine Learning | |
| Barker | Malware Analysis Techniques: Tricks for the triage of adversarial software | |
| Ostler | Defensive cyber battle damage assessment through attack methodology modeling | |
| Bayuk | CyberForensics: understanding information security investigations | |
| Leibolt | The complex world of corporate CyberForensics investigations | |
| Shaaban et al. | Comparison study of digital forensics analysis techniques; findings versus resources | |
| Casey et al. | Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides | |
| Gurkok | Cyber forensics and incident response | |
| Chu | CCNA Cyber Ops SECOPS–Certification Guide 210-255: Learn the skills to pass the 210-255 certification exam and become a competent SECOPS associate | |
| Middelweerd et al. | Defining who is attacking by how they are hacking | |
| Gurkok | Cyber Forensics and Incidence Response | |
| Dhavale | Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention | |
| Bortniker | Malware analysis for cyber-threat intelligence | |
| Ismaila et al. | Malware and Digital Forensics |