Text
Malware forensics field guide for Windows systems: digital forensics field guides
Terdapat bibliografi dan indeks.
Table of Contents
Chapter 1. Malware Incident Response
Volatile Data Collection and Analysis Tools
Non-Volatile Data Collection and Analysis Tools
Selected Readings
Jurisprudence/RFCS/Technical Specifications
Chapter 2. Memory Forensics
Chapter 3. Post-Mortem Forensics
Chapter 4. Legal Considerations
Chapter 5. File Identification and Profiling
Chapter 6. Analysis of a Malware Specimen
Guidelines for Examining a Malicious File Specimen
Establishing the Environment Baseline
Pre-Execution Preparation: System and Network Monitoring
Execution Artifact Capture: Digital Impression and Trace Evidence
Executing the Malicious Code Specimen
Execution Trajectory Analysis: Observing Network, Process, Api, File System, and
Registry Activity
Automated Malware Analysis Frameworks
Online Malware Analysis Sandboxes
Defeating Obfuscation
Embedded Artifact Extraction Revisited
Interacting with and Manipulating the Malware Specimen: Exploring and Verifying Functionality and Purpose
Event Reconstruction and Artifact Review: Post-Run Data Analysis
Digital Virology: Advanced Profiling Through Malware Taxonomy and Phylogeny
No other version available