Managed code rootkits: hooking into runtime environments
Imagine being able to change the languages for the applications & nbsp;that a computer is running and taking control over it. That is exactly what managed code rootkits can do when they are placed within a computer. This new type of rootkit is hiding in a place that had previously been safe from...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington, MA
Syngress
© 2010
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | Imagine being able to change the languages for the applications & nbsp;that a computer is running and taking control over it. That is exactly what managed code rootkits can do when they are placed within a computer. This new type of rootkit is hiding in a place that had previously been safe from this type of attack, the application level. Code reviews do not currently look for back doors in the virtual machine (VM) where this new rootkit would be injected. An invasion of this magnitude allows an attacker to steal information on the infected computer, provide false information, and disable security checks. & nbsp;Erez Metula shows the reader how these rootkits are developed and inserted and how this attack can change the managed code & nbsp;that a computer & nbsp;is running whether that be JAVA, .NET, Android Dalvik or any other managed code. Management development scenarios, tools like ReFrameworker and countermeasures are covered, making & nbsp;this book a one stop shop for this new attack vector. Introduces the reader briefly to managed code environments and rootkits in general Completely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change language runtime implementation Focuses on managed code, including Java, .NET, Android Dalvik and reviews malware development scanarios "Introduces the reader briefly to managed code environments and rootkits in general--Completely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change language runtime implementation--Focuses on managed code including Java, .Net, Android Dalvik, and reviews malware development scenarios"-- |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 online resource |
ISBN: | 9781597495745 1597495743 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046125518 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2010 |||| o||u| ||||||eng d | ||
020 | |a 9781597495745 |9 978-1-59749-574-5 | ||
020 | |a 1597495743 |9 1-59749-574-3 | ||
035 | |a (ZDB-33-ESD)ocn677829104 | ||
035 | |a (OCoLC)677829104 | ||
035 | |a (DE-599)BVBBV046125518 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Metula, Erez |e Verfasser |4 aut | |
245 | 1 | 0 | |a Managed code rootkits |b hooking into runtime environments |c Erez Metula |
264 | 1 | |a Burlington, MA |b Syngress |c © 2010 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Imagine being able to change the languages for the applications & nbsp;that a computer is running and taking control over it. That is exactly what managed code rootkits can do when they are placed within a computer. This new type of rootkit is hiding in a place that had previously been safe from this type of attack, the application level. Code reviews do not currently look for back doors in the virtual machine (VM) where this new rootkit would be injected. An invasion of this magnitude allows an attacker to steal information on the infected computer, provide false information, and disable security checks. & nbsp;Erez Metula shows the reader how these rootkits are developed and inserted and how this attack can change the managed code & nbsp;that a computer & nbsp;is running whether that be JAVA, .NET, Android Dalvik or any other managed code. Management development scenarios, tools like ReFrameworker and countermeasures are covered, making & nbsp;this book a one stop shop for this new attack vector. Introduces the reader briefly to managed code environments and rootkits in general Completely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change language runtime implementation Focuses on managed code, including Java, .NET, Android Dalvik and reviews malware development scanarios | ||
520 | |a "Introduces the reader briefly to managed code environments and rootkits in general--Completely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change language runtime implementation--Focuses on managed code including Java, .Net, Android Dalvik, and reviews malware development scenarios"-- | ||
630 | 0 | 4 | |a Common Language Runtime |
650 | 7 | |a Common Language Runtime |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computers / Access control |2 fast | |
650 | 7 | |a Rootkits (Computer software) |2 fast | |
650 | 4 | |a Computers |x Access control | |
650 | 4 | |a Virtual computer systems |x Security measures | |
650 | 4 | |a Rootkits (Computer software) | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Laufzeitsystem |0 (DE-588)4343107-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rootkit |0 (DE-588)7518179-4 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Rootkit |0 (DE-588)7518179-4 |D s |
689 | 0 | 2 | |a Laufzeitsystem |0 (DE-588)4343107-0 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597495745 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031505972 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9781597495745 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180444745302016 |
---|---|
any_adam_object | |
author | Metula, Erez |
author_facet | Metula, Erez |
author_role | aut |
author_sort | Metula, Erez |
author_variant | e m em |
building | Verbundindex |
bvnumber | BV046125518 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn677829104 (OCoLC)677829104 (DE-599)BVBBV046125518 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03739nmm a2200553zc 4500</leader><controlfield tag="001">BV046125518</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495745</subfield><subfield code="9">978-1-59749-574-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597495743</subfield><subfield code="9">1-59749-574-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn677829104</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)677829104</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046125518</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Metula, Erez</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Managed code rootkits</subfield><subfield code="b">hooking into runtime environments</subfield><subfield code="c">Erez Metula</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">© 2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Imagine being able to change the languages for the applications & nbsp;that a computer is running and taking control over it. That is exactly what managed code rootkits can do when they are placed within a computer. This new type of rootkit is hiding in a place that had previously been safe from this type of attack, the application level. Code reviews do not currently look for back doors in the virtual machine (VM) where this new rootkit would be injected. An invasion of this magnitude allows an attacker to steal information on the infected computer, provide false information, and disable security checks. & nbsp;Erez Metula shows the reader how these rootkits are developed and inserted and how this attack can change the managed code & nbsp;that a computer & nbsp;is running whether that be JAVA, .NET, Android Dalvik or any other managed code. Management development scenarios, tools like ReFrameworker and countermeasures are covered, making & nbsp;this book a one stop shop for this new attack vector. Introduces the reader briefly to managed code environments and rootkits in general Completely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change language runtime implementation Focuses on managed code, including Java, .NET, Android Dalvik and reviews malware development scanarios</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Introduces the reader briefly to managed code environments and rootkits in general--Completely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change language runtime implementation--Focuses on managed code including Java, .Net, Android Dalvik, and reviews malware development scenarios"--</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Common Language Runtime</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Common Language Runtime</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Rootkits (Computer software)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Virtual computer systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Rootkits (Computer software)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Laufzeitsystem</subfield><subfield code="0">(DE-588)4343107-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rootkit</subfield><subfield code="0">(DE-588)7518179-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Rootkit</subfield><subfield code="0">(DE-588)7518179-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Laufzeitsystem</subfield><subfield code="0">(DE-588)4343107-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597495745</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031505972</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597495745</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046125518 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:35:52Z |
institution | BVB |
isbn | 9781597495745 1597495743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031505972 |
oclc_num | 677829104 |
open_access_boolean | |
physical | 1 online resource |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Syngress |
record_format | marc |
spelling | Metula, Erez Verfasser aut Managed code rootkits hooking into runtime environments Erez Metula Burlington, MA Syngress © 2010 1 online resource txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Imagine being able to change the languages for the applications & nbsp;that a computer is running and taking control over it. That is exactly what managed code rootkits can do when they are placed within a computer. This new type of rootkit is hiding in a place that had previously been safe from this type of attack, the application level. Code reviews do not currently look for back doors in the virtual machine (VM) where this new rootkit would be injected. An invasion of this magnitude allows an attacker to steal information on the infected computer, provide false information, and disable security checks. & nbsp;Erez Metula shows the reader how these rootkits are developed and inserted and how this attack can change the managed code & nbsp;that a computer & nbsp;is running whether that be JAVA, .NET, Android Dalvik or any other managed code. Management development scenarios, tools like ReFrameworker and countermeasures are covered, making & nbsp;this book a one stop shop for this new attack vector. Introduces the reader briefly to managed code environments and rootkits in general Completely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change language runtime implementation Focuses on managed code, including Java, .NET, Android Dalvik and reviews malware development scanarios "Introduces the reader briefly to managed code environments and rootkits in general--Completely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change language runtime implementation--Focuses on managed code including Java, .Net, Android Dalvik, and reviews malware development scenarios"-- Common Language Runtime Common Language Runtime fast Computer security fast Computers / Access control fast Rootkits (Computer software) fast Computers Access control Virtual computer systems Security measures Rootkits (Computer software) Computer security Laufzeitsystem (DE-588)4343107-0 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rootkit (DE-588)7518179-4 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Rootkit (DE-588)7518179-4 s Laufzeitsystem (DE-588)4343107-0 s 1\p DE-604 http://www.sciencedirect.com/science/book/9781597495745 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Metula, Erez Managed code rootkits hooking into runtime environments Common Language Runtime Common Language Runtime fast Computer security fast Computers / Access control fast Rootkits (Computer software) fast Computers Access control Virtual computer systems Security measures Rootkits (Computer software) Computer security Laufzeitsystem (DE-588)4343107-0 gnd Computersicherheit (DE-588)4274324-2 gnd Rootkit (DE-588)7518179-4 gnd |
subject_GND | (DE-588)4343107-0 (DE-588)4274324-2 (DE-588)7518179-4 |
title | Managed code rootkits hooking into runtime environments |
title_auth | Managed code rootkits hooking into runtime environments |
title_exact_search | Managed code rootkits hooking into runtime environments |
title_full | Managed code rootkits hooking into runtime environments Erez Metula |
title_fullStr | Managed code rootkits hooking into runtime environments Erez Metula |
title_full_unstemmed | Managed code rootkits hooking into runtime environments Erez Metula |
title_short | Managed code rootkits |
title_sort | managed code rootkits hooking into runtime environments |
title_sub | hooking into runtime environments |
topic | Common Language Runtime Common Language Runtime fast Computer security fast Computers / Access control fast Rootkits (Computer software) fast Computers Access control Virtual computer systems Security measures Rootkits (Computer software) Computer security Laufzeitsystem (DE-588)4343107-0 gnd Computersicherheit (DE-588)4274324-2 gnd Rootkit (DE-588)7518179-4 gnd |
topic_facet | Common Language Runtime Computer security Computers / Access control Rootkits (Computer software) Computers Access control Virtual computer systems Security measures Laufzeitsystem Computersicherheit Rootkit |
url | http://www.sciencedirect.com/science/book/9781597495745 |
work_keys_str_mv | AT metulaerez managedcoderootkitshookingintoruntimeenvironments |