+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Antivirus Engines. From Methods to Innovations, Design, and Applications

  • Book

  • October 2024
  • Elsevier Science and Technology
  • ID: 6035935

Antivirus Engines: From Methods to Innovations, Design, and Applications offers an in-depth exploration of the core techniques employed in modern antivirus software. It provides a thorough technical analysis of detection methods, algorithms, and integration strategies essential for the development and enhancement of antivirus solutions. The examples provided are written in Python, showcasing foundational, native implementations of key concepts, allowing readers to gain practical experience with the underlying mechanisms of antivirus technology.

The text covers a wide array of scanning techniques, including heuristic and smart scanners, hexadecimal inspection, and cryptographic hash functions such as MD5 and SHA for file integrity verification. These implementations highlight the crucial role of various scanning engines, from signature-based detection to more advanced models like behavioral analysis and heuristic algorithms. Each chapter provides clear technical examples, demonstrating the integration of modules and methods required for a comprehensive antivirus system, addressing both common and evolving threats.

Beyond simple virus detection, the content illustrates how polymorphic malware, ransomware, and state-sponsored attacks are tackled using multi-layered approaches. Through these examples, students, researchers, and security professionals gain practical insight into the operation of antivirus engines, enhancing their ability to design or improve security solutions in a rapidly changing threat environment.

Please Note: This is an On Demand product, delivery may take up to 11 working days after payment has been received.

Table of Contents

1. History
2. The Internet
3. Operating systems
4. Operating system APIs
5. Cryptography
6. Exploits
7. Malware types and classification
8. Antivirus engines
9. Algorithms
10. MD5/SHA signatures and scanners
11. Disinfections, banks and vaults
12. Hexadecimal signatures and scanners
13. Heuristic signatures and scanners
14. Smart scanners and rabbit holes
15. Process and user behavior
16. The network
17. Appendices
18. References

Authors

Paul A. Gagniuc Associate Professor of Programming Languages, University Politehnica of Bucharest (UPB), Romania. Dr. Paul A. Gagniuc is an associate professor of programming languages at University Politehnica of Bucharest (UPB) in Romania. Over a period of a decade, Dr. Gagniuc provided an original learning experience for many generations of students from many parts of the world. Dr. Gagniuc is the author of the most cited book in the history of University Politehnica of Bucharest. He has published numerous high-profile scientific research articles, patents, books and is the recipient of several awards for exceptional scientific results. He is also the creator of an antivirus project called Scut Antivirus, from which he brings his security expertise.