Skip to main content

Injection of Malicious Code in Application

  • Chapter
  • First Online:
Cybercrime, Digital Forensics and Jurisdiction

Part of the book series: Studies in Computational Intelligence ((SCI,volume 593))

Abstract

One of the biggest headaches that come along with networked and internet-connected computers is the absolute requirement of dealing with malicious code attacks (Erbschloe 2004). There is no choice; if your systems are not equipped in some way with antivirus protection, sooner or later some bug will eat them. There is also very little to be gained by whining about how vulnerable computer systems are to malicious code attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • J. Aycock, Computer Viruses and Malware: Advances in Information Security (Springer, New York, 2010)

    Google Scholar 

  • M. Erbschloe, Trojans, Worms, and Spyware: A Computer Security Professional’s Guide to Malicious Code (Butterworth-Heinemann, New York, 2004)

    Google Scholar 

  • N. Falliere, Stuxnet introduces the first known rootkit for industrial control systems (2010), http://www.symantec.com. Accessed 15 Aug 2011

  • B. Griffin, An introduction to viruses and malicious code: overview (2000), http://www.symantec.com. Accessed 15 Aug 2011

  • M. Klang, A critical look at the regulation of computer viruses. Int. J. Law Inf. Technol. 11(2) (2003)

    Google Scholar 

  • J. Richardson, Stuxnet as cyberwarfare: applying the law of war to the virtual battlefield (2011), http://www.ssrn.com. Accessed 15 Aug 2011

  • D. Schweitzer, Securing the Network from Malicious Code: A Complete Guide to Defending Against Viruses, Worms, and Trojans (Wiley, New York, 2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Chawki .

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Chawki, M., Darwish, A., Khan, M.A., Tyagi, S. (2015). Injection of Malicious Code in Application. In: Cybercrime, Digital Forensics and Jurisdiction. Studies in Computational Intelligence, vol 593. Springer, Cham. https://doi.org/10.1007/978-3-319-15150-2_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-15150-2_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-15149-6

  • Online ISBN: 978-3-319-15150-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics