Using Memory Management Structures to Identify and Analyze Malicious and Benign Data:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Abschlussarbeit Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Erlangen ; Nürnberg
Friedrich-Alexander-Universität Erlangen-Nürnberg
2024
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext Volltext Volltext |
Beschreibung: | 1 Online-Ressource (x, 114 Seiten) Illustrationen, Diagramme |
DOI: | 10.25593/open-fau-1103 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV049883474 | ||
003 | DE-604 | ||
005 | 20250110 | ||
007 | cr|uuu---uuuuu | ||
008 | 240924s2024 gw a||| om||| 00||| eng d | ||
015 | |a 24,O10 |2 dnb | ||
016 | 7 | |a 134183350X |2 DE-101 | |
024 | 7 | |a 10.25593/open-fau-1103 |2 doi | |
024 | 7 | |a urn:nbn:de:101:1-2409130504534.209736719526 |2 urn | |
035 | |a (OCoLC)1466916840 | ||
035 | |a (DE-599)DNB134183350X | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BY | ||
049 | |a DE-384 |a DE-473 |a DE-703 |a DE-1051 |a DE-824 |a DE-29 |a DE-12 |a DE-91 |a DE-19 |a DE-1049 |a DE-92 |a DE-739 |a DE-898 |a DE-355 |a DE-706 |a DE-20 |a DE-1102 |a DE-860 |a DE-2174 | ||
084 | |8 2\p |a 004 |2 23sdnb | ||
084 | |8 1\p |a 005.8 |2 23ksdnb | ||
100 | 1 | |a Block, Frank |e Verfasser |0 (DE-588)1343033918 |4 aut | |
245 | 1 | 0 | |a Using Memory Management Structures to Identify and Analyze Malicious and Benign Data |c vorgelegt von Frank Block |
246 | 1 | 3 | |a Verwendung von Speicherverwaltungsstrukturen zur Identifizierung und Analyse von schadhaften und gutartigen Daten |
264 | 1 | |a Erlangen ; Nürnberg |b Friedrich-Alexander-Universität Erlangen-Nürnberg |c 2024 | |
300 | |a 1 Online-Ressource (x, 114 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
502 | |b Dissertation |c Friedrich-Alexander-Universität Erlangen-Nürnberg |d 2024 | ||
583 | 1 | |a Archivierung/Langzeitarchivierung gewährleistet |5 DE-101 |2 pdager | |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Malware |0 (DE-588)4687059-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 0 | 1 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 2 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 0 | 3 | |a Malware |0 (DE-588)4687059-3 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 0 | |u https://open.fau.de/handle/openfau/31904 |x Verlag |z kostenfrei |3 Volltext |
856 | 4 | 0 | |u https://doi.org/10.25593/open-fau-1103 |x Resolving-System |z kostenfrei |3 Volltext |
856 | 4 | 0 | |u https://nbn-resolving.org/urn:nbn:de:101:1-2409130504534.209736719526 |x Resolving-System |z kostenfrei |3 Volltext |
856 | 4 | 0 | |u https://d-nb.info/134183350X/34 |x Langzeitarchivierung Nationalbibliothek |z kostenfrei |3 Volltext |
883 | 0 | |8 1\p |a emakn |c 0,59605 |d 20240914 |q DE-101 |u https://d-nb.info/provenance/plan#emakn | |
883 | 0 | |8 2\p |a emasg |c 0,58674 |d 20240914 |q DE-101 |u https://d-nb.info/provenance/plan#emasg | |
912 | |a ebook | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035222785 |
Datensatz im Suchindex
_version_ | 1820875483618738176 |
---|---|
adam_text | |
any_adam_object | |
author | Block, Frank |
author_GND | (DE-588)1343033918 |
author_facet | Block, Frank |
author_role | aut |
author_sort | Block, Frank |
author_variant | f b fb |
building | Verbundindex |
bvnumber | BV049883474 |
collection | ebook |
ctrlnum | (OCoLC)1466916840 (DE-599)DNB134183350X |
doi_str_mv | 10.25593/open-fau-1103 |
format | Thesis Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV049883474</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20250110</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240924s2024 gw a||| om||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">24,O10</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">134183350X</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.25593/open-fau-1103</subfield><subfield code="2">doi</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">urn:nbn:de:101:1-2409130504534.209736719526</subfield><subfield code="2">urn</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1466916840</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB134183350X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BY</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-384</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1102</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-2174</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="8">2\p</subfield><subfield code="a">004</subfield><subfield code="2">23sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="8">1\p</subfield><subfield code="a">005.8</subfield><subfield code="2">23ksdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Block, Frank</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1343033918</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Using Memory Management Structures to Identify and Analyze Malicious and Benign Data</subfield><subfield code="c">vorgelegt von Frank Block</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Verwendung von Speicherverwaltungsstrukturen zur Identifizierung und Analyse von schadhaften und gutartigen Daten</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Erlangen ; Nürnberg</subfield><subfield code="b">Friedrich-Alexander-Universität Erlangen-Nürnberg</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (x, 114 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="b">Dissertation</subfield><subfield code="c">Friedrich-Alexander-Universität Erlangen-Nürnberg</subfield><subfield code="d">2024</subfield></datafield><datafield tag="583" ind1="1" ind2=" "><subfield code="a">Archivierung/Langzeitarchivierung gewährleistet</subfield><subfield code="5">DE-101</subfield><subfield code="2">pdager</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://open.fau.de/handle/openfau/31904</subfield><subfield code="x">Verlag</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.25593/open-fau-1103</subfield><subfield code="x">Resolving-System</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://nbn-resolving.org/urn:nbn:de:101:1-2409130504534.209736719526</subfield><subfield code="x">Resolving-System</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://d-nb.info/134183350X/34</subfield><subfield code="x">Langzeitarchivierung Nationalbibliothek</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="883" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">emakn</subfield><subfield code="c">0,59605</subfield><subfield code="d">20240914</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#emakn</subfield></datafield><datafield tag="883" ind1="0" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">emasg</subfield><subfield code="c">0,58674</subfield><subfield code="d">20240914</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#emasg</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ebook</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035222785</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV049883474 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:16:22Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035222785 |
oclc_num | 1466916840 |
open_access_boolean | 1 |
owner | DE-384 DE-473 DE-BY-UBG DE-703 DE-1051 DE-824 DE-29 DE-12 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-1049 DE-92 DE-739 DE-898 DE-BY-UBR DE-355 DE-BY-UBR DE-706 DE-20 DE-1102 DE-860 DE-2174 |
owner_facet | DE-384 DE-473 DE-BY-UBG DE-703 DE-1051 DE-824 DE-29 DE-12 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-1049 DE-92 DE-739 DE-898 DE-BY-UBR DE-355 DE-BY-UBR DE-706 DE-20 DE-1102 DE-860 DE-2174 |
physical | 1 Online-Ressource (x, 114 Seiten) Illustrationen, Diagramme |
psigel | ebook |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Friedrich-Alexander-Universität Erlangen-Nürnberg |
record_format | marc |
spelling | Block, Frank Verfasser (DE-588)1343033918 aut Using Memory Management Structures to Identify and Analyze Malicious and Benign Data vorgelegt von Frank Block Verwendung von Speicherverwaltungsstrukturen zur Identifizierung und Analyse von schadhaften und gutartigen Daten Erlangen ; Nürnberg Friedrich-Alexander-Universität Erlangen-Nürnberg 2024 1 Online-Ressource (x, 114 Seiten) Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier Dissertation Friedrich-Alexander-Universität Erlangen-Nürnberg 2024 Archivierung/Langzeitarchivierung gewährleistet DE-101 pdager Eindringerkennung (DE-588)4706627-1 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Malware (DE-588)4687059-3 gnd rswk-swf Computerforensik (DE-588)4774034-6 gnd rswk-swf (DE-588)4113937-9 Hochschulschrift gnd-content Computerforensik (DE-588)4774034-6 s Kryptoanalyse (DE-588)4830502-9 s Eindringerkennung (DE-588)4706627-1 s Malware (DE-588)4687059-3 s DE-604 https://open.fau.de/handle/openfau/31904 Verlag kostenfrei Volltext https://doi.org/10.25593/open-fau-1103 Resolving-System kostenfrei Volltext https://nbn-resolving.org/urn:nbn:de:101:1-2409130504534.209736719526 Resolving-System kostenfrei Volltext https://d-nb.info/134183350X/34 Langzeitarchivierung Nationalbibliothek kostenfrei Volltext 1\p emakn 0,59605 20240914 DE-101 https://d-nb.info/provenance/plan#emakn 2\p emasg 0,58674 20240914 DE-101 https://d-nb.info/provenance/plan#emasg |
spellingShingle | Block, Frank Using Memory Management Structures to Identify and Analyze Malicious and Benign Data Eindringerkennung (DE-588)4706627-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Malware (DE-588)4687059-3 gnd Computerforensik (DE-588)4774034-6 gnd |
subject_GND | (DE-588)4706627-1 (DE-588)4830502-9 (DE-588)4687059-3 (DE-588)4774034-6 (DE-588)4113937-9 |
title | Using Memory Management Structures to Identify and Analyze Malicious and Benign Data |
title_alt | Verwendung von Speicherverwaltungsstrukturen zur Identifizierung und Analyse von schadhaften und gutartigen Daten |
title_auth | Using Memory Management Structures to Identify and Analyze Malicious and Benign Data |
title_exact_search | Using Memory Management Structures to Identify and Analyze Malicious and Benign Data |
title_full | Using Memory Management Structures to Identify and Analyze Malicious and Benign Data vorgelegt von Frank Block |
title_fullStr | Using Memory Management Structures to Identify and Analyze Malicious and Benign Data vorgelegt von Frank Block |
title_full_unstemmed | Using Memory Management Structures to Identify and Analyze Malicious and Benign Data vorgelegt von Frank Block |
title_short | Using Memory Management Structures to Identify and Analyze Malicious and Benign Data |
title_sort | using memory management structures to identify and analyze malicious and benign data |
topic | Eindringerkennung (DE-588)4706627-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Malware (DE-588)4687059-3 gnd Computerforensik (DE-588)4774034-6 gnd |
topic_facet | Eindringerkennung Kryptoanalyse Malware Computerforensik Hochschulschrift |
url | https://open.fau.de/handle/openfau/31904 https://doi.org/10.25593/open-fau-1103 https://nbn-resolving.org/urn:nbn:de:101:1-2409130504534.209736719526 https://d-nb.info/134183350X/34 |
work_keys_str_mv | AT blockfrank usingmemorymanagementstructurestoidentifyandanalyzemaliciousandbenigndata AT blockfrank verwendungvonspeicherverwaltungsstrukturenzuridentifizierungundanalysevonschadhaftenundgutartigendaten |