Malware forensic field guide for linux system : digital forensic field guide / Malin H. Cameron, Eogham Casey, and James M. Aquillina.
Publication details: Amsterdam: Elsevier, c2014Description: xxxix, 574 p. ill. 23 cmISBN:- 9781597494700
- 23 005.8 MAL
Item type | Current library | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
Book Closed Access | Engineering Library | 005.8 MAL 1 (Browse shelf(Opens below)) | 1 | Available | BUML24010414 |
Contents
1. Malware incident response
Nonvolatile Data collection from a live linux system
Conclusion
2. Linux memory forensic
Introduction
Interpreting various data structures in Linux memory
Dumping Linux process memory
Dissecting Linux process memory
Conclusion
3. Postmortem forensics
Introduction
Examining Linux file system
Examining application traces
Key word searching
Forensics reconstruction of compromised Linux systems
etc
4. Legal considerations
Framing the issues
General considerations
Source of investigative authority
Statutory limits on Authority
Tools for acquiring data
etc
5. File identification and profiling
Introduction
File similarity indexing
Symbolic and debug information
Embedded file Metadata
File Obfuscation:Packing and encryption identification
etc
6. Analysis of a Malware specimen
Introduction
Pre-execution preparation: system and network monitoring
Execution Artifact Capture: Digital impression and trace evidence
Executing the malicious code specimen
Automated Malware analysis framework
Interacting with and manipulating the Malware specimen
etc
Includes Index p. 565-574
There are no comments on this title.