000 a
999 _c34003
_d34003
008 250606b xxu||||| |||| 00| 0 eng d
020 _a9781718503267
082 _a005.88
_bCUC
100 _aCucci, Kyle
245 _aEvasive malware : understanding deceptive and self-defending threats
260 _bNo Starch Press,
_c2024
_aSan Francisco :
300 _axxix, 456 p. ;
_bill.,
_c24 cm
365 _b69.99
_c$
_d89.00
504 _aIncludes bibliographical references and index.
520 _aWe’re all aware of Stuxnet, ShadowHammer, Sunburst, and similar attacks that use evasion to remain hidden while defending themselves from detection and analysis. Because advanced threats like these can adapt and, in some cases, self-destruct to evade detection, even the most seasoned investigators can use a little help with analysis now and then. Evasive Malware will introduce you to the evasion techniques used by today’s malicious software and show you how to defeat them. Following a crash course on using static and dynamic code analysis to uncover malware’s true intentions, you’ll learn how malware weaponizes context awareness to detect and skirt virtual machines and sandboxes, plus the various tricks it uses to thwart analysis tools. You’ll explore the world of anti-reversing, from anti-disassembly methods and debugging interference to covert code execution and misdirection tactics. You’ll also delve into defense evasion, from process injection and rootkits to fileless malware. Finally, you’ll dissect encoding, encryption, and the complexities of malware obfuscators and packers to uncover the evil within
650 _aComputer security
650 _aMalware Prevention
650 _aNetworking
650 _aSecurity
942 _2ddc
_cBK