Identifying malicious code through reverse engineering:
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer
2009
|
Schriftenreihe: | Advances in information security
44 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | X, 188 S. Ill., graph. Darst. |
ISBN: | 9780387098241 9780387894683 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV035336188 | ||
003 | DE-604 | ||
005 | 20090909 | ||
007 | t | ||
008 | 090227s2009 gw ad|| |||| 00||| eng d | ||
015 | |a 08,N29,0024 |2 dnb | ||
016 | 7 | |a 989384705 |2 DE-101 | |
020 | |a 9780387098241 |c Gb. : ca. EUR 98.07 (freier Pr.), ca. sfr 152.50 (freier Pr.) |9 978-0-387-09824-1 | ||
020 | |a 9780387894683 |9 978-0-387-89468-3 | ||
024 | 3 | |a 9780387098241 | |
028 | 5 | 2 | |a 12325412 |
035 | |a (OCoLC)261924757 | ||
035 | |a (DE-599)DNB989384705 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-703 | ||
050 | 0 | |a TA168.5 | |
082 | 0 | |a 005.84 |2 22 | |
084 | |a ST 237 |0 (DE-625)143623: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
245 | 1 | 0 | |a Identifying malicious code through reverse engineering |c ed. by Abhishek Singh. With contrib. by Baibhav Singh |
264 | 1 | |a New York, NY |b Springer |c 2009 | |
300 | |a X, 188 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Advances in information security |v 44 | |
650 | 4 | |a Computer viruses | |
650 | 4 | |a Reverse engineering | |
650 | 4 | |a Software protection | |
650 | 0 | 7 | |a Filterschaltung |0 (DE-588)4113559-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsanalyse |0 (DE-588)4684292-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Software |0 (DE-588)4055382-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Netzwerktheorie |0 (DE-588)4171531-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Operationsverstärker |0 (DE-588)4043590-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Analogschaltung |0 (DE-588)4122796-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Reverse Engineering |0 (DE-588)4391935-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Verstärker |0 (DE-588)4063236-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Software |0 (DE-588)4055382-6 |D s |
689 | 0 | 1 | |a Reverse Engineering |0 (DE-588)4391935-2 |D s |
689 | 0 | 2 | |a Sicherheitsanalyse |0 (DE-588)4684292-5 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Analogschaltung |0 (DE-588)4122796-7 |D s |
689 | 1 | 1 | |a Operationsverstärker |0 (DE-588)4043590-8 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Netzwerktheorie |0 (DE-588)4171531-7 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Verstärker |0 (DE-588)4063236-2 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Filterschaltung |0 (DE-588)4113559-3 |D s |
689 | 4 | |5 DE-604 | |
700 | 1 | |a Singh, Abhishek |4 edt | |
700 | 1 | |a Singh, Baibhav |e Sonstige |4 oth | |
830 | 0 | |a Advances in information security |v 44 |w (DE-604)BV014168308 |9 44 | |
856 | 4 | 2 | |m Digitalisierung UB Bayreuth |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017140552&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-017140552 |
Datensatz im Suchindex
_version_ | 1804138650417496064 |
---|---|
adam_text | Table
of
Contents
Assembly Language
1.0
Introduction
................................................................................................1
1.1
Registers
.....................................................................................................1
1.1.1
General Purpose Register
..................................................................1
1.1.2
FLAGS Register
................................................................................2
1.2 80x86
Instruction Format
............................................................................3
1.2.1
Instruction Prefix
...............................................................................4
1.2.2
Lock and Repeat Prefixes
..................................................................4
1.2.3
Segment Override Prefixes
................................................................4
1.2.4
Opcode
...............................................................................................5
1.3
Instructions
.................................................................................................7
1.3.1
Basic Instructions
...............................................................................7
1.3.2
Floating Point Instruction
.................................................................10
1.4
Stack Setup
...............................................................................................13
1.4.1.
Passing Parameters in
С
to the Procedure
.......................................13
1.4.2
Local Data Space on the Stack
........................................................15
1.5
Calling Conventions
..................................................................................16
1.5.1
cdecl calling convention
..................................................................16
1.5.2
fastcall calling convention
...............................................................17
1.5.3
stdcall calling convention
................................................................17
1.5.4
thiscall
..............................................................................................17
1.6
Data Constructs
........................................................................................17
1.6.1
Global Variables
..............................................................................18
1.6.2
Local Variables
................................................................................18
1.6.3
Registers
..........................................................................................19
1.6.4
Imported Variables
..........................................................................19
1.6.5
Thread Local Storage (TLS)
............................................................20
1.6.6
Executable Data Section
..................................................................20
1.7
Representation of Arithmetic Operations in Assembly
............................21
1.7.1
Multiplication
..................................................................................22
1.7.2
Division
...........................................................................................22
1.7.3
Modulo
.............................................................................................24
1.8
Representation of Data Structure in Assembly
..........................................24
1.8.1
Representation of Array in Assembly
..............................................24
1.8.2
Representation of Linked List in Assembly
....................................25
1.9
Virtual Function Call in Assembly
...........................................................26
1.9.1
Representation of classes in Assembly
............................................27
1.10
Conclusion
........................................................................................28
viii Table of
Contents
Fundamental of Windows
2.0
Introduction
..............................................................................................29
2.1
Memory Management
..............................................................................29
2.1.1
Virtual Memory Management
.........................................................29
2.1.1.1
Virtual Memory Management in Windows NT
...................32
2.1.1.2
Impact of Hooking
...............................................................33
2.1.2
Segmented Memory Management
...................................................34
2.1.3
Paged Memory Management
...........................................................36
2.2
Kernel Memory and User Memory
..........................................................37
2.2.1
Kernel Memory Space
.....................................................................37
2.2.2
Section Object
...................................................................................38
2.3
Virtual Address Descriptor
.......................................................................39
2.3.1
User Mode Address Space
...............................................................39
2.3.2
Memory Management in Windows
.................................................39
2.3.3
Objects and Handles
........................................................................40
2.3.4
Named Objects
................................................................................40
2.4
Processes and Threads
..............................................................................41
2.4.1
Context Switching
...........................................................................43
2.4.1.1
Context Switches and Mode Switches
..................................43
2.4.2
Synchronization Objects
..................................................................44
2.4.2.1
Critical Section
....................................................................44
2.4.2.2
Mutex
...................................................................................44
2.4.2.3
Semaphore
...........................................................................45
2.4.2.4
Event
....................................................................................45
2.4.2.5
Metered
Section
...................................................................45
2.5
Process Initialization Sequence
.................................................................46
2.5.1
Application Programming Interface
................................................47
2.6
Reversing Windows NT
............................................................................48
2.6.1
ExpEchoPoolCalls
............................................................................49
2.6.2
ObpShowAUocAndFree
..................................................................49
2.6.3
LpcpTraceMessages
........................................................................49
2.6.4
MmDebug
........................................................................................49
2.6.5
NtGlobalFlag
...................................................................................49
2.6.6
SepDumpSD
....................................................................................50
2.6.7
CmLogLevel and CmLogSelect
......................................................50
2.7
Security Features in Vista
.........................................................................50
2.7.1
Address Space Layout Randomization (ASLR)
..............................50
2.7.2
Stack Randomization
.......................................................................51
2.7.3
Heap Defenses
.................................................................................52
2.7.4
NX
....................................................................................................54
2.7.5
/GS
...................................................................................................55
2.7.6
Pointer Encoding
.............................................................................56
2.7.7
Cryptographic API in Windows Vista
.............................................58
Table
of
Contents ix
2.7.8 Crypto-Agility .................................................................................59
2.7.9 CryptoAgility in CNG .....................................................................60
2.7.10
Algorithm
Providers ......................................................................62
2.7.11
Random Number
Generator...........................................................63
2.7.12
Hash Functions...............................................................................
64
2.7.13 Symmetrie
Encryption ...................................................................
65
2.7.14 Asymmetrie
Encryption.................................................................
67
2.7.15
Signatures and Verification
...........................................................68
2.8
Conclusion
................................................................................................68
Portable Executable File Format
3.0
Introduction
..............................................................................................69
3.1
PE file Format
...........................................................................................69
3.2
Import Address Table
...............................................................................77
3.3
Executable and Linking Format
...............................................................79
3.3.1
ELF Header
......................................................................................79
3.3.2
The Program Header Table
...............................................................80
3.4
Conclusion
................................................................................................83
Reversing Binaries for Identifying Vulnerabilities
4.0
Introduction
..............................................................................................85
4.1
Stack Overflow
.........................................................................................85
4.1.1
CAN-2002-1
123
Microsoft SQL Server Hello Authentication
Buffer Overflow
..............................................................................88
4.1.2
CAN
-2004-0399
Exim Buffer Overflow
........................................88
4.1.3
Stack Checking
................................................................................90
4.2
Off-by-One Overflow
...............................................................................90
4.2.1
OpenBSD
2.7
FTP Daemon Off-by-One
.........................................93
4.2.3
Non-Executable Memory
.................................................................94
4.3
Heap Overflows
....................................................................................... 94
4.3.1
Heap Based Overflows
....................................................................96
4.4
Integer Overflows
...................................................................................106
4.4.1
Types Integer Overflow
.................................................................108
4.4.2
CAN-2004-0417 CVS Max dotdot Protocol Command
Integer Overflow
...........................................................................111
4.5
Format String
..........................................................................................112
4.5.1.
Format String Vulnerability
..........................................................113
4.5.2
Format String Denial of Service Attack
.........................................115
4.5.3
Format String Vulnerability Reading Attack
.................................115
4.6
SEH Structure Exception Handler
..........................................................116
4.6.1
Exploiting the SEH
........................................................................119
4.7
Writing Exploits General Concepts
.........................................................122
4.7.1
Stack Overflow Exploits
................................................................122
Table
of
Contents
4.7.2
Injection Techniques
......................................................................123
4.7.3
Optimizing the
Injection
Vector ....................................................
123
4.8
The Location
of the Payload
...................................................................123
4.8.1
Direct Jump (Guessing Offsets)
......................................................124
4.8.2
Blind Return
..................................................................................124
4.8.3
Pop Return
......................................................................................124
4.8.4
No Operation Sled
..........................................................................125
4.8.5
Call Register
...................................................................................125
4.8.6
Push Return
....................................................................................126
4.8.7
Calculating Offset
..........................................................................126
4.9
Conclusion
..............................................................................................126
Fundamental of Reverse Engineering
5.0
Introduction
.............................................................................................127
5.1
Anti-Reversing Method
...........................................................................127
5.2.1
Anti
Disassembly
............................................................................128
5.2.1.1
Linear Sweep Disassembler
................................................128
5.2.1.2
Recursive Traversal Disassembler
......................................130
5.2.1.3
Evasion of Disassemble
.....................................................131
5.2.2
Self Modifying Code
.....................................................................135
5.2.3
Virtual Machine Obfuscation
.........................................................139
5.3
Anti
Debugging Techniques
....................................................................140
5.3.1
Breakpoints
.....................................................................................142
5.3.1.1
Software Breakpoint
...........................................................142
5.3.1.2
Hardware Breakpoint
..........................................................143
5.3.1.3
Detecting Hardware Breakpoint
.........................................144
5.4
Virtual Machine Detection
......................................................................145
5.4.1
Checking Fingerprint Inside Memory, File System and Registry
.. 145
5.4.2
Checking System Tables
................................................................145
5.4.3
Checking Processor Instruction Set
...............................................146
5.5
Unpacking
...............................................................................................147
5.5.1
Manual Unpacking of Software
......................................................148
5.5.1.1
Finding an Original Entry Point of an Executable
..............148
5.5.1.2
Taking Memory Dump
.......................................................154
5.5.1.3
Import Table Reconstruction
..............................................156
5.5.1.4
Import Redirection and Code emulation
............................162
5.6
Conclusion
...............................................................................................166
Appendix
.....................................................................................................168
Index
............................................................................................................187
|
any_adam_object | 1 |
author2 | Singh, Abhishek |
author2_role | edt |
author2_variant | a s as |
author_facet | Singh, Abhishek |
building | Verbundindex |
bvnumber | BV035336188 |
callnumber-first | T - Technology |
callnumber-label | TA168 |
callnumber-raw | TA168.5 |
callnumber-search | TA168.5 |
callnumber-sort | TA 3168.5 |
callnumber-subject | TA - General and Civil Engineering |
classification_rvk | ST 237 |
ctrlnum | (OCoLC)261924757 (DE-599)DNB989384705 |
dewey-full | 005.84 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.84 |
dewey-search | 005.84 |
dewey-sort | 15.84 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02762nam a2200709 cb4500</leader><controlfield tag="001">BV035336188</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090909 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">090227s2009 gw ad|| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">08,N29,0024</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">989384705</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387098241</subfield><subfield code="c">Gb. : ca. EUR 98.07 (freier Pr.), ca. sfr 152.50 (freier Pr.)</subfield><subfield code="9">978-0-387-09824-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387894683</subfield><subfield code="9">978-0-387-89468-3</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9780387098241</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12325412</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)261924757</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB989384705</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TA168.5</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.84</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 237</subfield><subfield code="0">(DE-625)143623:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Identifying malicious code through reverse engineering</subfield><subfield code="c">ed. by Abhishek Singh. With contrib. by Baibhav Singh</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 188 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in information security</subfield><subfield code="v">44</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer viruses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Reverse engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software protection</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Filterschaltung</subfield><subfield code="0">(DE-588)4113559-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsanalyse</subfield><subfield code="0">(DE-588)4684292-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerktheorie</subfield><subfield code="0">(DE-588)4171531-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Operationsverstärker</subfield><subfield code="0">(DE-588)4043590-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Analogschaltung</subfield><subfield code="0">(DE-588)4122796-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Reverse Engineering</subfield><subfield code="0">(DE-588)4391935-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Verstärker</subfield><subfield code="0">(DE-588)4063236-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Reverse Engineering</subfield><subfield code="0">(DE-588)4391935-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheitsanalyse</subfield><subfield code="0">(DE-588)4684292-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Analogschaltung</subfield><subfield code="0">(DE-588)4122796-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Operationsverstärker</subfield><subfield code="0">(DE-588)4043590-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Netzwerktheorie</subfield><subfield code="0">(DE-588)4171531-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Verstärker</subfield><subfield code="0">(DE-588)4063236-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Filterschaltung</subfield><subfield code="0">(DE-588)4113559-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singh, Abhishek</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singh, Baibhav</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in information security</subfield><subfield code="v">44</subfield><subfield code="w">(DE-604)BV014168308</subfield><subfield code="9">44</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bayreuth</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017140552&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017140552</subfield></datafield></record></collection> |
id | DE-604.BV035336188 |
illustrated | Illustrated |
indexdate | 2024-07-09T21:31:34Z |
institution | BVB |
isbn | 9780387098241 9780387894683 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017140552 |
oclc_num | 261924757 |
open_access_boolean | |
owner | DE-703 |
owner_facet | DE-703 |
physical | X, 188 S. Ill., graph. Darst. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Springer |
record_format | marc |
series | Advances in information security |
series2 | Advances in information security |
spelling | Identifying malicious code through reverse engineering ed. by Abhishek Singh. With contrib. by Baibhav Singh New York, NY Springer 2009 X, 188 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Advances in information security 44 Computer viruses Reverse engineering Software protection Filterschaltung (DE-588)4113559-3 gnd rswk-swf Sicherheitsanalyse (DE-588)4684292-5 gnd rswk-swf Software (DE-588)4055382-6 gnd rswk-swf Netzwerktheorie (DE-588)4171531-7 gnd rswk-swf Operationsverstärker (DE-588)4043590-8 gnd rswk-swf Analogschaltung (DE-588)4122796-7 gnd rswk-swf Reverse Engineering (DE-588)4391935-2 gnd rswk-swf Verstärker (DE-588)4063236-2 gnd rswk-swf Software (DE-588)4055382-6 s Reverse Engineering (DE-588)4391935-2 s Sicherheitsanalyse (DE-588)4684292-5 s DE-604 Analogschaltung (DE-588)4122796-7 s Operationsverstärker (DE-588)4043590-8 s Netzwerktheorie (DE-588)4171531-7 s Verstärker (DE-588)4063236-2 s Filterschaltung (DE-588)4113559-3 s Singh, Abhishek edt Singh, Baibhav Sonstige oth Advances in information security 44 (DE-604)BV014168308 44 Digitalisierung UB Bayreuth application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017140552&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Identifying malicious code through reverse engineering Advances in information security Computer viruses Reverse engineering Software protection Filterschaltung (DE-588)4113559-3 gnd Sicherheitsanalyse (DE-588)4684292-5 gnd Software (DE-588)4055382-6 gnd Netzwerktheorie (DE-588)4171531-7 gnd Operationsverstärker (DE-588)4043590-8 gnd Analogschaltung (DE-588)4122796-7 gnd Reverse Engineering (DE-588)4391935-2 gnd Verstärker (DE-588)4063236-2 gnd |
subject_GND | (DE-588)4113559-3 (DE-588)4684292-5 (DE-588)4055382-6 (DE-588)4171531-7 (DE-588)4043590-8 (DE-588)4122796-7 (DE-588)4391935-2 (DE-588)4063236-2 |
title | Identifying malicious code through reverse engineering |
title_auth | Identifying malicious code through reverse engineering |
title_exact_search | Identifying malicious code through reverse engineering |
title_full | Identifying malicious code through reverse engineering ed. by Abhishek Singh. With contrib. by Baibhav Singh |
title_fullStr | Identifying malicious code through reverse engineering ed. by Abhishek Singh. With contrib. by Baibhav Singh |
title_full_unstemmed | Identifying malicious code through reverse engineering ed. by Abhishek Singh. With contrib. by Baibhav Singh |
title_short | Identifying malicious code through reverse engineering |
title_sort | identifying malicious code through reverse engineering |
topic | Computer viruses Reverse engineering Software protection Filterschaltung (DE-588)4113559-3 gnd Sicherheitsanalyse (DE-588)4684292-5 gnd Software (DE-588)4055382-6 gnd Netzwerktheorie (DE-588)4171531-7 gnd Operationsverstärker (DE-588)4043590-8 gnd Analogschaltung (DE-588)4122796-7 gnd Reverse Engineering (DE-588)4391935-2 gnd Verstärker (DE-588)4063236-2 gnd |
topic_facet | Computer viruses Reverse engineering Software protection Filterschaltung Sicherheitsanalyse Software Netzwerktheorie Operationsverstärker Analogschaltung Reverse Engineering Verstärker |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017140552&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014168308 |
work_keys_str_mv | AT singhabhishek identifyingmaliciouscodethroughreverseengineering AT singhbaibhav identifyingmaliciouscodethroughreverseengineering |