Lecture 10 - C lass Notes October 9th , 2008 Malicious Code...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Class Notes October 9 th , 2008 Malicious Code Viruses must be executed Used to be spread on distribution media (e.g. floppy disks, cd’s, etc. .) Today email makes virus distribution much more effective and easy, simply embed the virus in an email attachment Once the virus has been activated, the virus emails itself to all users in the victims mail book. Virus can be hidden in a .doc file, spreadsheet, maybe even a jpeg file, .exe Appended Viruses 1. Virus attaches a copy of itself at the beginning of a host program so the virus executes first, then the program executes. Simple, easy to do, most common viruses do this. 2. Viruses that surround a program a. For example, a virus attaches itself to a program that lists all files on a disk, the virus becomes active again before the files are displayed. 3. Integration of the virus into a program (integrated viruses and replacements) a. Virus replaces some of the original code and integrates itself into the target
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
b. Virus could even replace the target and mimic its behavior
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 3

Lecture 10 - C lass Notes October 9th , 2008 Malicious Code...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online