0% found this document useful (0 votes)
276 views4 pages

Advanced Malware Books 2025

Malware Research

Uploaded by

tatexa5087
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
276 views4 pages

Advanced Malware Books 2025

Malware Research

Uploaded by

tatexa5087
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Advanced Books on Malware and Research (2025)

1. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

Authors: Michael Sikorski, Andrew Honig

Why Read It?

This is a classic and practical book for learning malware analysis techniques step-by-step. It

covers debugging,

disassembly, dynamic analysis, and static analysis, with hands-on labs and real-world examples.

Focus Areas:

- Tools like IDA Pro, OllyDbg, and Wireshark

- How to analyze Windows malware

- Techniques for bypassing anti-analysis methods

2. Malware Data Science: Attack Detection and Attribution

Authors: Joshua Saxe, Hillary Sanders

Why Read It?

This book combines machine learning with malware analysis, focusing on automated detection

and classification of malware.

It's perfect for applying data science to cybersecurity.

Focus Areas:

- Building machine learning models for malware detection

- Feature extraction from malware samples

- Case studies and examples of malware data science

3. The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac
Memory

Authors: Michael Hale Ligh, Andrew Case, Jamie Levy, Aaron Walters

Why Read It?

A comprehensive guide for analyzing system memory to detect malware and advanced threats.

It's indispensable for forensic

investigators and malware researchers.

Focus Areas:

- Memory analysis techniques for different operating systems

- Identifying rootkits, backdoors, and other stealthy malware

- Using tools like Volatility

4. Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats

Authors: Alex Matrosov, Eugene Rodionov, Sergey Bratus, Bruce Dang

Why Read It?

This advanced book focuses on stealthy malware, such as rootkits and bootkits, which operate at

the lowest levels of

systems. It dives deep into bypassing modern defenses.

Focus Areas:

- Kernel-mode rootkits and bootkit techniques

- UEFI and BIOS vulnerabilities

- Detailed analysis of real-world rootkits

5. Advanced Malware Analysis: The Practical Guide to the Malicious Code Landscape

Authors: Christopher Elisan

Why Read It?

This book explains complex malware topics, such as advanced obfuscation techniques, evasion
strategies, and modern malware

ecosystems.

Focus Areas:

- Analyzing polymorphic and metamorphic malware

- Reverse engineering advanced threats

- Malware delivery methods and exploit kits

6. Reversing: Secrets of Reverse Engineering

Author: Eldad Eilam

Why Read It?

Although not strictly about malware, this book provides a strong foundation in reverse engineering,

a critical skill for

malware research.

Focus Areas:

- Reverse engineering techniques for Windows binaries

- Cracking protections like encryption and obfuscation

- Applying reverse engineering to analyze malware

7. Cybersecurity Attacks: Red Team Strategies, Techniques, and Tools

Authors: Johann Rehberger

Why Read It?

This book explores malware in the context of offensive cybersecurity operations, detailing red

team methodologies and attack

frameworks like Cobalt Strike and Metasploit.

Focus Areas:

- Custom payload and malware development


- Command and control (C2) techniques

- Advanced post-exploitation tools and tactics

8. Applied Incident Response (for context)

Author: Steve Anson

Why Read It?

Though not solely about malware, it provides advanced incident response techniques for detecting

and mitigating modern

threats, including malware.

Focus Areas:

- Response strategies to advanced malware attacks

- Indicators of compromise (IoCs) analysis

- Rootkit detection and eradication

Next Steps

Pair these books with hands-on labs and updated resources like:

- Online platforms like Malware Unicorn's Reverse Engineering Malware Workshops or Practical

Reverse Engineering Challenges.

- Tools like IDA Pro, Ghidra, Volatility, and Cuckoo Sandbox.

You might also like