How to defeat advanced malware new tools for protection and forensics

<i><b>How to Defeat Advanced Malware </b></i>is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both lev...

Descripción completa

Detalles Bibliográficos
Otros Autores: Dalziel, Max, author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Waltham, Massachusetts : Syngress 2015.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629219906719
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright Page
  • Table of contents
  • Author Biography
  • Contributing Editor Biography
  • Chapter 1 - A Primer on Detection for Security
  • 1.1 Today's approach: "compromise-first detection"
  • Chapter 2 - 2014 Endpoint Exploitation Trends
  • 2.1 Zero-day trends
  • 2.3 Emerging zero-day exploitation techniques
  • Chapter 3 - The Proposed Solution
  • 3.1 The principle of least privilege
  • 3.2 Detection's folly
  • Chapter 4 - Protection's Weak Link
  • 4.1 Desktop virtualization does not secure the endpoint
  • 4.2 Detection and isolation using VMs
  • Chapter 5 - Micro-Virtualization
  • 5.1 Related work
  • 5.2 A practical example
  • 5.3 Hardware-enforced task isolation
  • 5.4 Hardware virtualization technology
  • 5.5 Micro-virtualization at work
  • 5.6 The microvisor
  • 5.7 Memory and CPU isolation
  • 5.8 Virtualized file system (VFS)
  • 5.9 Virtualized IP networking - the mobile SDN
  • 5.10 Virtualized desktop services
  • 5.11 Creation and management of micro-VMs
  • 5.12 Reducing the attack surface
  • Chapter 6 - Advanced Forensics and Analysis
  • 6.1 Micro-VM behavioral analysis
  • 6.2 Advanced live forensics
  • 6.3 LAVA architecture
  • 6.4 Conclusion.