Back to Search

A System-Space Pattern-Driven Verification Framework for Defending Core Services Against Malware-Driven Exploits

AUTHOR PerlarrubĂ­
PUBLISHER Independent Publisher (02/12/2025)
PRODUCT TYPE Paperback (Paperback)

Description

The continuing growth of Internet connected devices will drive malware authors to use either unpatched system or software vulnerabilities as a way to point a full-blown attack. Designing and maintaining a trusted and secure system environment is increasingly more important as data flows more freely through the interconnected devices. Though many vendors, import different security features into their product, they cannot design a complete, secure and trustworthy system to handle current computing environments. Malware writers usually look for either system vulnerabilities or application vulnerabilities to deposit their code into the victim computer. There are three important issues that the defenders may encounter to fix. First, the application process has more flexibility to carry out their illegal operations on the victim computer. Second, both malware and security system can run in the same execution environment. Therefore, malware tries to modify the code segment and execute data segment to achieve their ultimate goal. Third, most security systems have incorporated with limited methods to dynamically detect the behavior of malicious executable. Malware authors are taking the advantage of these three problems making malware more powerful. Recent malware often designed with intention to compromise, possibly, many victim computers, stay long by hiding its footprints, and circumvent the secured system. Remote attackers can even control a large private network by compromising a secured server or workstation. This leads to tamper the kernel of the underlying operating system which would question the trustworthiness of the entire computing environment. Kernel integrity is more important to ensure a secure computing environment.

Show More
Product Format
Product Details
ISBN-13: 9798230684954
Binding: Paperback or Softback (Trade Paperback (Us))
Content Language: English
More Product Details
Page Count: 168
Carton Quantity: 23
Product Dimensions: 8.50 x 0.36 x 11.00 inches
Weight: 0.89 pound(s)
Country of Origin: US
Subject Information
BISAC Categories
Computers | General
Computers | General
Computers | General
Descriptions, Reviews, Etc.
publisher marketing

The continuing growth of Internet connected devices will drive malware authors to use either unpatched system or software vulnerabilities as a way to point a full-blown attack. Designing and maintaining a trusted and secure system environment is increasingly more important as data flows more freely through the interconnected devices. Though many vendors, import different security features into their product, they cannot design a complete, secure and trustworthy system to handle current computing environments. Malware writers usually look for either system vulnerabilities or application vulnerabilities to deposit their code into the victim computer. There are three important issues that the defenders may encounter to fix. First, the application process has more flexibility to carry out their illegal operations on the victim computer. Second, both malware and security system can run in the same execution environment. Therefore, malware tries to modify the code segment and execute data segment to achieve their ultimate goal. Third, most security systems have incorporated with limited methods to dynamically detect the behavior of malicious executable. Malware authors are taking the advantage of these three problems making malware more powerful. Recent malware often designed with intention to compromise, possibly, many victim computers, stay long by hiding its footprints, and circumvent the secured system. Remote attackers can even control a large private network by compromising a secured server or workstation. This leads to tamper the kernel of the underlying operating system which would question the trustworthiness of the entire computing environment. Kernel integrity is more important to ensure a secure computing environment.

Show More
List Price $33.00
Your Price  $32.67
Paperback