TY - BOOK AU - Malin, Cameron. H. AU - Casey, Eoghan AU - Aquillina, James M. AU - Rose, Curtis W. TI - Malware forensic field guide for linux system: digital forensic field guide SN - 9781597494700 U1 - 005.8 23 PY - 2014/// CY - Amsterdam PB - Elsevier KW - Malware Forensic KW - Linux systems N1 - Contents 1. Malware incident response Nonvolatile Data collection from a live linux system Conclusion 2. Linux memory forensic Introduction Interpreting various data structures in Linux memory Dumping Linux process memory Dissecting Linux process memory Conclusion 3. Postmortem forensics Introduction Examining Linux file system Examining application traces Key word searching Forensics reconstruction of compromised Linux systems etc 4. Legal considerations Framing the issues General considerations Source of investigative authority Statutory limits on Authority Tools for acquiring data etc 5. File identification and profiling Introduction File similarity indexing Symbolic and debug information Embedded file Metadata File Obfuscation:Packing and encryption identification etc 6. Analysis of a Malware specimen Introduction Pre-execution preparation: system and network monitoring Execution Artifact Capture: Digital impression and trace evidence Executing the malicious code specimen Automated Malware analysis framework Interacting with and manipulating the Malware specimen etc ; Includes Index p. 565-574 ER -