Table of contents: 1. Introduction 2. Dynamic Binary Analysis Platform 3. Hidden Code Extraction 4. Privacy-breaching Behavior Analysis 5. Hooking Behavior Analysis 6. Analysis of trigger conditions and hidden behaviors 7. Concluding remarks
Terdapat bibliografi dan indeks. Table of contents: 1. Malware Evolution: A Snapshot of Threats and Countermeasures in 2005 2. Static Disassembly and Code Analysis 3. A Next-Generation Platform for Analyzing Executables 4. Behavioral and Structural Properties of Malicious Code 5. Detection and Prevention of SQL Injection Attacks 6. Very Fast Containment of Scanning Worms, Revisited 7.…