Front Cover; Managed Code Rootkits; Copyright; Table of Contents; Acknowledgements; About the Author; Part I: Overview; Chapter 1. Introduction; Chapter 2. Managed Code Rootkits; Part II: Malware Development; Chapter 3. Tools of the Trade; Chapter 4. Runtime Modification; Chapter 5. Manipulating the Runtime; Chapter 6. Extending the Language with a Malware API; Chapter 7. Automated Framework Modification; Chapter 8. Advanced Topics; Part III: Countermeasures; Chapter 9. Defending against MCRs; Part IV: Where Do We Go from Here?; Chapter 10. Other Uses of Runtime Modification; Index
Summary
"Introduces the reader briefly to managed code environments and rootkits in general--Completely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change language runtime implementation--Focuses on managed code including Java, .Net, Android Dalvik, and reviews malware development scenarios"--Provided by publisher