Amazon cover image
Image from Amazon.com

Malware forensic field guide for linux system : digital forensic field guide / Malin H. Cameron, Eogham Casey, and James M. Aquillina.

By: Contributor(s): Publication details: Amsterdam: Elsevier, c2014Description: xxxix, 574 p. ill. 23 cmISBN:
  • 9781597494700
Subject(s): DDC classification:
  • 23 005.8 MAL
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Book Closed Access Book Closed Access Engineering Library 005.8 MAL 1 (Browse shelf(Opens below)) 1 Available BUML24010414

Contents

1. Malware incident response
Nonvolatile Data collection from a live linux system
Conclusion

2. Linux memory forensic
Introduction
Interpreting various data structures in Linux memory
Dumping Linux process memory
Dissecting Linux process memory
Conclusion

3. Postmortem forensics
Introduction
Examining Linux file system
Examining application traces
Key word searching
Forensics reconstruction of compromised Linux systems
etc

4. Legal considerations
Framing the issues
General considerations
Source of investigative authority
Statutory limits on Authority
Tools for acquiring data
etc

5. File identification and profiling
Introduction
File similarity indexing
Symbolic and debug information
Embedded file Metadata
File Obfuscation:Packing and encryption identification
etc

6. Analysis of a Malware specimen
Introduction
Pre-execution preparation: system and network monitoring
Execution Artifact Capture: Digital impression and trace evidence
Executing the malicious code specimen
Automated Malware analysis framework
Interacting with and manipulating the Malware specimen
etc


Includes Index p. 565-574

There are no comments on this title.

to post a comment.