Managed code rootkits : hooking into runtime environments /
Imagine being able to change the languages for the applications & nbsp;that a computer is running and taking control over it. That is exactly what managed code rootkits can do when they are placed within a computer. This new type of rootkit is hiding in a place that had previously been safe from...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Burlington, MA :
Syngress,
�2010.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Part I: Overview
- Chapter 01
- Introduction
- Chapter 02
- Managed Code Rootkits
- Part II: Malware Development
- Chapter 03
- Tools of the Trade
- Chapter 04
- & nbsp;Runtime Modification
- Chapter 05
- Manipulating the Runtime
- Chapter 06
- Extending the Language with a Malware API
- Chapter 07
- Automated Framework Modification
- Chapter 08
- Advanced Topics
- Part III: Countermeasures
- Chapter 09
- Defending against MCRs
- Part IV: Where Do We Go from Here?
- Chapter 10
- Other Uses of Runtime Modification.