menu
{ "item_title" : "Network Virtualisation", "item_author" : [" Helmut Petritsch "], "item_description" : "Could dynamic Malware analysis be more dynamic by assigning net-work calls an injected result, defined by the analysis process? Yes, but only if the network access was completely virtualised. This book explains how this virtualisation could be achieved. It starts with an instruction of dynamic Malware analysis and the usage of sockets in the Windows operating system. By using Qemu and TTAnalyze (a tool for dynamic Malware analysis), it describes how network access could be virtualised, so that system calls relating to sockets (and therefore accessing the network) are intercepted at the system call gate, then manipulated and imitated for a dynamic analysis. The book also defines the most important synchronisation techniques of multi-threaded applications for their (network) acti-vities. The reader will gain a thorough understanding, of how high level functions of the Winsock library are executed with the aim of system calls.", "item_img_path" : "https://covers2.booksamillion.com/covers/bam/3/83/646/919/3836469197_b.jpg", "price_data" : { "retail_price" : "52.92", "online_price" : "52.92", "our_price" : "52.92", "club_price" : "52.92", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Network Virtualisation|Helmut Petritsch

Network Virtualisation

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Could dynamic Malware analysis be more dynamic by assigning net-work calls an injected result, defined by the analysis process? Yes, but only if the network access was completely virtualised. This book explains how this virtualisation could be achieved. It starts with an instruction of dynamic Malware analysis and the usage of sockets in the Windows operating system. By using Qemu and TTAnalyze (a tool for dynamic Malware analysis), it describes how network access could be virtualised, so that system calls relating to sockets (and therefore accessing the network) are intercepted at the system call gate, then manipulated and imitated for a dynamic analysis. The book also defines the most important synchronisation techniques of multi-threaded applications for their (network) acti-vities. The reader will gain a thorough understanding, of how high level functions of the Winsock library are executed with the aim of system calls.

This item is Non-Returnable

Details

  • ISBN-13: 9783836469197
  • ISBN-10: 3836469197
  • Publisher: VDM Verlag Dr. Mueller E.K.
  • Publish Date: April 2008
  • Dimensions: 9 x 6 x 0.19 inches
  • Shipping Weight: 0.3 pounds
  • Page Count: 92

Related Categories

You May Also Like...

    1

BAM Customer Reviews