Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Malware forensics field guide for Linux systems : digital forensics field guides
Malin C., Casey E., Aquilina J., Syngress Publishing, Waltham, MA, 2013. 624 pp. Type: Book (978-1-597494-70-0)
Date Reviewed: Oct 8 2014

Digital forensics remains an under-researched area, partly due to the interdisciplinary challenges specific to this research. The authors draw on their unique combination of experiences in law enforcement investigation (Malin, FBI Cyber Behavioral Analysis Center), academic and practitioner forensics (Casey, digital forensic expert and Editor in Chief of Digital Investigation), and the legal field (Aquilina, former Assistant US Attorney) to provide comprehensive and practical insight into malware forensics for Linux systems.

Digital forensics and malware analysis are usually discussed separately in the literature; however, there are overlaps in both processes and techniques, and I am glad that this book attempts to fill this gap, integrating forensic practices into malware analysis.

Being a practical researcher, I enjoyed reading the book. The step-by-step guidance and technical details of potential forensic artifacts in the various chapters will be extremely useful to forensic investigation. The use of relevant court cases in the discussion also helps the reader to understand the context and real-world implications (for example, faced by a forensic investigator) better. I only have a minor quibble: I would have preferred to have the list of references, cases cited, and resources at the end of the book rather than at the end of each chapter.

In conclusion, this book is a useful companion for law enforcement and the forensic community, as it will enhance their capability to deal with cases involving malware on Linux systems. For example, the reminders and checklists in the “Pitfalls to Avoid” section are particularly handy.

More reviews about this item: Amazon

Reviewer:  Kim-Kwang Raymond Choo Review #: CR142805 (1501-0016)
Bookmark and Share
  Reviewer Selected
 
 
Security and Protection (D.4.6 )
 
 
Linux (D.4.0 ... )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Practical UNIX security
Garfinkel S., Spafford G., O’Reilly & Associates, Inc., Sebastopol, CA, 1991. Type: Book (9780937175729)
Jun 1 1992
Trusted products evaluation
Chokhani S. Communications of the ACM 35(7): 64-76, 1992. Type: Article
Oct 1 1993
An experience using two covert channel analysis techniques on a real system design
Haigh J., Kemmerer R., McHugh J., Young W. IEEE Transactions on Software Engineering SE-13(2): 157-168, 1987. Type: Article
Nov 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy