{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Seminar5_2010 - Seminar 5 Malicious Software(Malware Fabian...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Fabian Ng 1 Seminar 5 Mal icious Soft ware ( Malware )
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Fabian Ng 2 Malware Malicious codeoften masquerades as good softwareor attaches itself to good software Somemalicious programs need host programs Trojan horses, logic bombs, viruses Others can exist and propagate independently Worms, automated viruses Therearemany infection vectors and propagation mechanisms
Background image of page 2
Fabian Ng 3 Viruses and ”Malicious Programs” Computer “Viruses ” and related programs havetheability to replicate themselves on an ever increasing number of computers. They originally spread by peoplesharing floppy disks. Now they spread primarily over theInternet (a “Worm”). Other “Malicious Programs ” may beinstalled by hand on a single machine. They may also bebuilt into widely distributed commercial softwarepackages. Thesearevery hard to detect beforethepayload activates (Trojan Horses, Trap Doors, and Logic Bombs).
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Fabian Ng 4 Taxanomy of Malicious Programs
Background image of page 4
Fabian Ng 5 Software Comments Trap doors This is a secret door into a piece of program. Some one who knows the trap door can gain access without going through the proper channel which usually involves security checks. For instance, some programs may allow access without authentication when it sees a special sequence of keystrokes. It is usually very difficult to discover or control such hidden threats after the development of the program. Logic Bombs Logic bomb is a piece of code that is embedded in a legitimate piece of program. It will invoke certain action when some special conditions are met. The special conditions could include, for instance, when the system date reaches a special pre-set date, etc.
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}