Identifying Malicious Code Through Reverse Engineering

Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world. Identifying Malicious Code through Reverse Engineering provides information on reverse...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Singh, Abhishek (Editor)
Format: Electronic eBook
Language:English
Published: Boston, MA : Springer US, 2009.
Series:Advances in Information Security, 44
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • Assembly Language
  • Fundamental of Windows
  • Portable Executable File Format
  • Reversing Binaries for Identification of Vulnerabilities
  • Fundamental of Reverse Engineering.