Seminar5_2010 - Seminar 5 Malicious Software (Malware)...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Fabian Ng 1 Seminar 5 Mal icious Soft ware ( Malware )
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Fabian Ng 2 Malware Malicious code often masquerades as good software or attaches itself to good software Some malicious programs need host programs Trojan horses, logic bombs, viruses Others can exist and propagate independently Worms, automated viruses There are many infection vectors and propagation mechanisms
Background image of page 2
Fabian Ng 3 Viruses and ”Malicious Programs” Computer “Viruses ” and related programs have the ability to replicate themselves on an ever increasing number of computers. They originally spread by people sharing floppy disks. Now they spread primarily over the Internet (a “Worm”). Other “Malicious Programs ” may be installed by hand on a single machine. They may also be built into widely distributed commercial software packages. These are very hard to detect before the payload activates (Trojan Horses, Trap Doors, and Logic Bombs).
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Fabian Ng 4 Taxanomy of Malicious Programs
Background image of page 4
Fabian Ng 5 Software Comments Trap doors This is a secret door into a piece of program. Some one who knows the trap door can gain access without going through the proper channel which usually involves security checks. For instance, some programs may allow access without authentication when it sees a special sequence of keystrokes. It is usually very difficult to discover or control such hidden threats after the development of the program. Logic Bombs Logic bomb is a piece of code that is embedded in a legitimate piece of program. It will invoke certain action when some special conditions are met. The special conditions could include, for instance, when the system date reaches a special pre-set date, etc. Trojan Horses
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 18

Seminar5_2010 - Seminar 5 Malicious Software (Malware)...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online