: John Aycock
: Spyware and Adware
: Springer-Verlag
: 9780387777412
: 1
: CHF 85.50
:
: Informatik
: English
: 146
: Wasserzeichen
: PC/MAC/eReader/Tablet
: PDF

Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field.

Spyware and Adware is a reference book designed for researchers and professors in computer science, as well as a secondary text for advanced-level students. This book is also suitable for practitioners in industry.



John Aycock is an associate professor at the University of Calgary in the Department of Computer Science. He received a B.Sc. from the University of Calgary, and an M.Sc. and Ph.D. from the University of Victoria. He researches computer security, focusing on malicious software, spam, and online crime. Dr. Aycock conceived and taught the University's 'Computer Viruses and Malware' and 'Spam and Spyware' courses.

Contents8
List of Figures12
Preface14
Chapter 1 Introduction16
1.1 Definitions and History16
1.2 Motivation19
Chapter Notes21
Chapter 2 Getting There24
2.1 Installation24
2.1.1 Explicit, Voluntary Installation24
2.1.2 Drive-by Downloads, User Involvement25
2.1.3 Drive-by Downloads, No User Involvement31
2.1.4 Installation via Malware34
2.2 Startup35
2.2.1 Application-Specific Startup35
2.2.2 GUI Startup36
2.2.3 System Startup37
2.2.4 Kernel Startup37
2.2.5 Defenses38
Chapter Notes39
Chapter 3Staying There43
3.1 Avoiding Detection43
3.1.1 Basic Detection Avoidance43
3.1.2 Anti-Spyware46
3.1.3 Advanced Detection Avoidance: Rootkits47
3.2 Avoiding Uninstall51
3.2.1 Passive Avoidance51
3.2.2 Active Avoidance52
Chapter Notes54
Chapter 4Keylogging58
4.1 User Space Keylogging60
4.1.1 Polling60
4.1.2 Event Copying61
4.1.3 Event Monitoring61
4.2 User Space Keylogging Defenses62
Chapter Notes68
Chapter 5 Phoning Home72
5.1 Push vs. Pull72
5.2 Finding Home74
5.3 Steganography76
5.4 Information Leaking Defenses79
Chapter Notes80
Chapter 6 Advertising84
6.1 Types of Advertisement84
6.1.1 Banner Advertisement87
6.1.2 Banner Advertisement with Pull-down Menu88
6.1.3 Expandable Banner Advertisement89
6.1.4 Pushdown Banner Advertisement90
6.1.5 Pop-up Advertisement90
6.1.6 Pop-under Advertisement91
6.1.7 Floating Advertisement92
6.1.8 Tear-back Advertisement92
6.1.9 In-text Advertisement93
6.1.10 Transition Advertisement94
6.1.11 Video Advertisements95
6.2 Intent and Content96
Chapter Notes98
Chapter 7 Advertisement Implementation103
7.1 Implementation Location104
7.1.1 Implementation on the User Machine104
7.1.2 Implementation in the Network108
7.1.3 Implementation near the User Machine109
7.1.4 Implementation on the Server110
7.2 Choosing Keywords111
7.3 Blocking Advertisements113
7.3.1 Pop-up Blocking113
7.3.2 General Advertisement Blocking114
7.3.3 Blocker Evasion and Blocker Blocking115
Chapter Notes116
Chapter 8Tracking Users122
8.1 Cookies122
8.1.1 Defenses127
8.1.2 Other Browser-Related Tracking Methods128
8.2 User Profiling129
8.2.1 Cognitive Styles, Mood, and Personality130
8.2.2 Future Actions130
8.2.3 Demographic Information131
8.2.4 Social Networks131
8.2.5 Real World Activities132
8.2.6 Physical Location132
8.2.7 Search Terms and Keywords133
8.2.8 Disinterests133
Chapter Notes134
Chapter 9 Conclusion138
Chapter Notes139
References140
Index154