作者: Erez Metula
DOI:
关键词:
摘要: Imagine being able to change the languages for applicationsthat a computer is running and taking control over it. That exactly what managed code rootkits can do when they are placed within computer. This new type of rootkit hiding in place that had previously been safe from this attack-the application level. Code reviews not currently look back doors virtual machine (VM) where would be injected. An invasion magnitude allows an attacker steal information on infected computer, provide false information, disable security checks.Erez Metula shows reader how these developed inserted attack codethat computeris running, whether JAVA, .NET, Android Dalvik or any other code. Management development scenarios, tools like ReFrameworker, countermeasures covered, makingthis book one stop shop vector. Introduces briefly environments general Completely details level demonstrates hacker language runtime implementation Focuses including Java, malware scanarios