Lecture-MaliciousCode-3-1-10

Lecture-MaliciousCode-3-1-10 - CIS3360 Lecture:MaliciousCode

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Malicious Code 1 CIS 3360 Lecture: Malicious Code Ratan K. Guha, Spring 2010 March 1, 2010
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Malicious Code 2 Overview and Reading Assignments Defining malicious logic Types Action by Viruses Prevention Strategies Reading Assignments: Chapter 3
Background image of page 2
Malicious Code 3 Malicious Logic Set of instructions that cause site security policy to be  violated
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Malicious Code 4 A broad term used to describe computer programs that are  created to inflict harm to computer system. The terms also  includes programs that are annoying and intrusive in  general. The term includes: viruses, worms, trojan horses, spyware,  ad-ware etc. Malware – (“malicious” + “software”)
Background image of page 4
Types of Malicious Code Viruses Recursively replicates a possibly evolved copy of itself by including a header  or footer stub in the bodies of healthy programs. Infect host file or system area First described by Fred Cohen in 1984. Whenever an infected program is launched, the stub is executed first which  carries out malicious activity before allowing the program to execute. Cannot spread to other computers on their own. 5 Malicious Code
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Malicious Code 6 Elk Cloner First known computer virus written around 1982 by a 15-year-old  high school student named Rich Skrenta for Apple II systems.  [Wikipedia] Message displayed 50th system boots: “Elk Cloner: The program with a personality It will get on all your disks It will infiltrate your chips Yes it's Cloner! It will stick to you like glue It will modify ram too Send in the Cloner!” http://www.skrenta.com/cloner/
Background image of page 6
Types of Malicious Code Worm Network viruses replicating on networks Copies itself from computer to computer Execute itself automatically on a remote machine without any extra help  from a user Typically standalone programs without a host program More categories Mailers and mass mailer worms: send themselves in an E-mail Octopus: exists as a set of programs on more than one computer on a  network likely to be more prevalent in the future Rabbits: exists as a single copy of itself at any point in time as it jumps  around on networked hosts Malicious Code 7
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Malicious Code 8 Morris Worm First known worm - November 2, 1988  Author - Robert Tappan Morris  Infected BSD Unix systems
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 29

Lecture-MaliciousCode-3-1-10 - CIS3360 Lecture:MaliciousCode

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online