Foreword by Rodrigo Rubira Branco
Chapter 1: What’s in a Rootkit: The TDL3 Case Study
Chapter 2: Festi Rootkit: The Most Advanced Spam and DDoS Bot
Chapter 3: Observing Rootkit Infections
Chapter 4: Evolution of the Bootkit
Chapter 5: Operating System Boot Process Essentials
Chapter 6: Boot Process Security
Chapter 7: Bootkit Infection Techniques
Chapter 8: Static Analysis of a Bootkit Using IDA Pro
Chapter 9: Bootkit Dynamic Analysis: Emulation and Virtualization
Chapter 10: An Evolution of MBR and VBR Infection Techniques: Olmasco
Chapter 11: IPL Bootkits: Rovnix and Carberp
Chapter 12: Gapz: Advanced VBR Infection
Chapter 13: The Rise of MBR Ransomware
Chapter 14: UEFI Boot vs. the MBR/VBR Boot Process
Chapter 15: Contemporary UEFI Bootkits
Chapter 16: UEFI Firmware Vulnerabilities
PART III: DEFENSE AND FORENSIC TECHNIQUES
Chapter 17: How UEFI Secure Boot Works
Chapter 18: Approaches to Analyzing Hidden Filesystems
Chapter 19: BIOS/UEFI Forensics: Firmware Acquisition and Analysis Approaches
3.128.198.49