Malware
Malware
Malware,
Malicious Software
Divided
VIRUS
A
Backdoor
Program
Secret
Logic Bomb
Triggers
action when
condition occur
Trojan Horse
A
Trojan is a useful or
apparently useful.
Program
codes
When
containing hidden
Virus Phases
Dormant
waiting on trigger event
Propagation
Each infected program will
now contain a clone of the
virus.
Triggering
The virus is activated.
Execution
The function is performed.
Virus Structure
program V :=
{goto main;
1234567;
subroutine infect-executable :=
{loop:
file := get-random-executable-file;
if (first-line-of-file = 1234567) then goto
loop
else prepend V to file; }
subroutine do-damage := {whatever
damage is to be done}
subroutine trigger-pulled := {return true
if condition holds}
main: main-program :=
{infectexecutable;
if trigger-pulled then do-damage;
goto next;}
next:
}
Parasitic virus
It attaches itself to executable files
and replicates.
. Memory-resident virus
Resides in memory.
This virus infects every program that
executes
virus
Mutates with every infection
Making detection impossible
Email Virus
Spread
Triggered
when user
opens attachment
Worms
Replicating
typically
Lack
of security of permanently
connected PC's
Virus Countermeasures
ANTI-VIRUS
VIRUS
Virus Countermeasures
Best
countermeasure is prevention
But in general not possible
hence need to do one or more of:
Detection
Identification
Removal
What happens if
Two