How to defeat advanced malware : new tools for protection and forensics /
How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by B...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Waltham, MA :
Elsevier, Syngress,
[2015]
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
Tabla de Contenidos:
- ch. 1. A primer on detection for security : 1.1 Today's approach: "compromise-first detection"
- ch. 2. 2014 Endpoint exploitation trends : 2.1 Zero-day trends
- 2.2 Notable zero-day exploitation techniques
- 2.3 Emerging zero-day exploitation techniques
- ch. 3. The proposed solution : 3.1 The principle of least priviledge ; 3.2 Detection's folly
- ch. 4. Protection's weak link : 4.1 Desktop virtualization does not secure the Endpoint
- 4.2 Detection and isolation using VMs
- ch. 5. Micro-Virtualization : 5.1 Related work ; 5.2 A practical example ; 5.3 Hardware-enforced task isolation ; 5.4 Hardware virtulization technology ; 5.5 Micro-virtualization at work ; 5.6 The microvisor ; 5.7 Memory and CPU isolation ; 5.8 Virtualized file system (VFS) ; 5.9 Virtualized IP Networking
- the mobile SDN ; 5.10 Virtualized desktop services ; 5.11 Creation and management of Micro-VMs ; 5.12 Reducing the attack surface
- ch. 6. Advanced forensics and analysis : 6.1 Micro-VM behavioral analysis ; 6.2 Advanced live forensics ; 6.3 LAVA architecture ; 6.4 Conclusion.