The Antivirus hacker's handbook / (Record no. 5448)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 04599nam a2200361 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | BD-DhGUBL |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20251120151423.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 251120s2015 inua of 001 0 eng|d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781119028758 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781119183525 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | BD-DhGUBL |
| Description conventions | BD-DhGUBL |
| -- | BD-DhGUBL |
| Transcribing agency | BD-DhGUBL |
| 082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.84 |
| Edition number | 23 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Koret, Joxean |
| Relator term | author. |
| 245 14 - TITLE STATEMENT | |
| Title | The Antivirus hacker's handbook / |
| Statement of responsibility, etc | Joxean Koret, and Elias Bachaalany. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication, distribution, etc | Indianapolis, Indiana : |
| Name of publisher, distributor, etc | John Wiley & Sons, |
| Date of publication, distribution, etc | c 2015. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xix, 359 p. : |
| Other physical details | ill. : |
| 500 ## - GENERAL NOTE | |
| General note | Includes index. |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Cover; Title Page; Copyright; Contents; Introduction; Part I Antivirus Basics; Chapter 1 Introduction to Antivirus Software; What Is Antivirus Software?; Antivirus Software: Past and Present; Antivirus Scanners, Kernels, and Products; Typical Misconceptions about Antivirus Software; Antivirus Features; Basic Features; Making Use of Native Languages; Scanners; Signatures; Compressors and Archives; Unpackers; Emulators; Miscellaneous File Formats; Advanced Features; Packet Filters and Firewalls; Self-Protection; Anti-Exploiting; Summary; Chapter 2 Reverse-Engineering the Core |
| 505 8# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Reverse-Engineering ToolsCommand-Line Tools versus GUI Tools; Debugging Symbols; Tricks for Retrieving Debugging Symbols; Debugging Tricks; Backdoors and Configuration Settings; Kernel Debugging; Debugging User-Mode Processes with a Kernel-Mode Debugger; Analyzing AV Software with Command-Line Tools; Porting the Core; A Practical Example: Writing Basic Python Bindings for Avast for Linux; A Brief Look at Avast for Linux; Writing Simple Python Bindings for Avast for Linux; The Final Version of the Python Bindings; A Practical Example: Writing Native C/C++ Tools for Comodo Antivirus for Linux |
| 505 8# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Other Components Loaded by the KernelSummary; Chapter 3 The Plug-ins System; Understanding How Plug-ins Are Loaded; A Full-Featured Linker in Antivirus Software; Understanding Dynamic Loading; Advantages and Disadvantages of the Approaches for Packaging Plug-ins; Types of Plug-ins; Scanners and Generic Routines; File Format and Protocol Support; Heuristics; Bayesian Networks; Bloom Filters; Weights-Based Heuristics; Some Advanced Plug-ins; Memory Scanners; Non-native Code; Scripting Languages; Emulators; Summary; Chapter 4 Understanding Antivirus Signatures; Typical Signatures; Byte-Streams |
| 505 8# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | ChecksumsCustom Checksums; Cryptographic Hashes; Advanced Signatures; Fuzzy Hashing; Graph-Based Hashes for Executable Files; Summary; Chapter 5 The Update System; Understanding the Update Protocols; Support for SSL/TLS; Verifying the Update Files; Dissecting an Update Protocol; When Protection Is Done Wrong; Summary; Part II Antivirus Software Evasion; Chapter 6 Antivirus Software Evasion; Who Uses Antivirus Evasion Techniques?; Discovering Where and How Malware Is Detected; Old Tricks for Determining Where Malware Is Detected: Divide and Conquer |
| 505 8# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Evading a Simple Signature-Based Detection with the Divide and Conquer TrickBinary Instrumentation and Taint Analysis; Summary; Chapter 7 Evading Signatures; File Formats: Corner Cases and Undocumented Cases; Evading a Real Signature; Evasion Tips and Tricks for Specific File Formats; PE Files; JavaScript; String Encoding; Executing Code on the Fly; Hiding the Logic: Opaque Predicates and Junk Code; PDF; Summary; Chapter 8 Evading Scanners; Generic Evasion Tips and Tricks; Fingerprinting Emulators; Advanced Evasion Tricks; Taking Advantage of File Format Weaknesses |
| 505 8# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Using Anti-emulation Techniques |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus' line of defense. You'll begin building your knowledge by diving into the reverse engineering process, which details how to start from a finished antivirus software program and work your way back through its development using the func |
| 546 ## - LANGUAGE NOTE | |
| Language note | English |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Hackers |
| Form subdivision | Handbooks, manuals, etc. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer viruses |
| Form subdivision | Handbooks, manuals, etc. |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Bachaalany, Elias |
| Relator term | author. |
| 776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
| International Standard Book Number | 9781119028758 |
| 776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
| International Standard Book Number | 1119028752 |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | <a href="https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/9781119183525?download=true">https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/9781119183525?download=true</a> |
| Link text | Click here to download |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | E-Books |
No items available.
Bengali Keyboard