Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Malware analyst’s cookbook and DVD : tools and techniques for fighting malicious code
Ligh M., Adair S., Hartstein B., Richard M., Wiley Publishing, Indianapolis, IN, 2010. 744 pp. Type: Book (978-0-470613-03-0)
Date Reviewed: Aug 11 2011

Ligh et al. present a pragmatic and recipe-driven reference for learning and performing malware analysis. Current malware is highly complex, due to ever-evolving Internet expansion and ubiquity, end-user behavior and reliance on permanent connectivity, and the steady increase in the size and inherent complexity of modern operating systems. As such, any serious malware analyst must master a broad technological landscape. The authors address most, if not all, of the concepts and tools required for this process. Structured in 18 chapters, the book is a unique reference for most practical activities that a security incident response team would need to handle.

The covered material is very rich in terms of both the scope of the content and the technical depth. The book starts with privacy-protecting recipes (Tor and secure shell (SSH) proxies), and then moves on to malware capturing (honeypot) and analysis labs (sandboxes and open-source frameworks), followed by a long series of chapters dedicated to the reverse-engineering of malware and digital forensic techniques for low-level post-mortem analysis of dump memory and network captures.

I was pleasantly surprised to discover that much of the content is very current. For example, the book covers the recent Volatility framework (a forensic memory analysis toolset), and some of the recipes rely even on the latest development (and not the official) version.

The final four chapters represent a true gold mine. Addressing topics that other textbooks do not (forensic analysis of memory dumps, rootkits, and registry files), these chapters alone justify the price of the book.

In this book, readers will find a practical collection of ready-to-use recipes, interleaved with background material that goes beyond the simple copy-paste nature of a recipe-driven book. In addition, they can use the book to gain an in-depth, technical understanding of the issues covered.

I did appreciate the companion DVD that included both the underlying datasets and the required software. Readers can also download the entire DVD from an author-supplied Google Code project. Following the recipes at one’s own pace is both easy and challenging.

This book is a must-read for every security professional in the field. Incident response team members and reverse engineers are the primary groups that will appreciate this book, but graduate students and academic researchers will also find a comprehensive, hands-on companion for performing the practical experimentation required in advanced research programs. For all of these readers, this book is highly valuable, informative, and extremely useful reading.

Reviewer:  Radu State Review #: CR139343 (1202-0125)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security and Protection (D.4.6 )
 
 
Invasive Software (D.4.6 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Practical UNIX security
Garfinkel S., Spafford G., O’Reilly & Associates, Inc., Sebastopol, CA, 1991. Type: Book (9780937175729)
Jun 1 1992
Trusted products evaluation
Chokhani S. Communications of the ACM 35(7): 64-76, 1992. Type: Article
Oct 1 1993
An experience using two covert channel analysis techniques on a real system design
Haigh J., Kemmerer R., McHugh J., Young W. IEEE Transactions on Software Engineering SE-13(2): 157-168, 1987. Type: Article
Nov 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy