Computer Viruses and Malware phần 5 ppsx
... Natvig [2 25] . 149 Nachenberg [220]. 150 Nachenberg [222]. 151 Nachenberg [222]. 152 Nachenberg [223]. 153 Chambers [59 ]. 154 Nachenberg [219]. 155 Chambers [59 ] and Natvig [2 25] . 156 Chambers ... [238]. 186 For examples, see [54 , 64, 238, 251 , 252 , 259 ]. The examples in Fig- ure 4.16 use the descriptions of VERY [64] and CVDL [ 251 , 252 , 259 ]. 187 Nachenberg...
Ngày tải lên: 14/08/2014, 18:20
... code and infecting it, as shown below. The target code is locally accessible to the machine where the virus 24 COMPUTER VIRUSES AND MALWARE 15 Cooke et al. [79] looks at botnet evolution, and ... discovering these details is unusual. 16 COMPUTER VIRUSES AND MALWARE access and the costs incurred to clean up from it. He was fined, and sentenced to probation an...
Ngày tải lên: 14/08/2014, 18:20
... 5. ANTI-ANTI-VIRUS TECHNIQUES 97 5. 1 Retroviruses 97 5. 2 Entry Point Obfuscation 99 5. 3 Anti-Emulation 99 5. 3.1 Outlast 99 5. 3.2 Outsmart 100 5. 3.3 Overextend 100 5. 4 Armoring 101 5. 4.1 ... partitioning 150 7 .5 Permutation scanning 152 8.1 An example network 157 8.2 Rate of patching over time 159 Computer Viruses and Malware List of Figures 1.1 Worm propagati...
Ngày tải lên: 14/08/2014, 18:20
Computer Viruses and Malware phần 3 ppt
... addresses: 56 COMPUTER VIRUSES AND MALWARE other .C hi chip,hip 2 ) >{4j ^^7j)—^^->(^ state failure(state) 123 456 789 0001003 05 Figure 4.2. Aho-Corasick finite automaton and failure ... filesystem browser. ^^ 52 COMPUTER VIRUSES AND MALWARE 122 Nachenberg [217]. 123 Yetiser[ 351 ]. 124 These are from Cohen [ 75] (upon whom this organization was o...
Ngày tải lên: 14/08/2014, 18:20
Computer Viruses and Malware phần 4 pps
... polymorphic viruses. A histogram can also be used to detect metamorphic viruses by comparing the emulation histogram to histograms of known metamorphic viruses. ^^^ 64 COMPUTER VIRUSES AND MALWARE ... hash table 80 COMPUTER VIRUSES AND MALWARE Static heuristics • Pro: Static heuristic analysis detects both known and unknown viruses. • Con: False positives are a...
Ngày tải lên: 14/08/2014, 18:20
Computer Viruses and Malware phần 6 pptx
... attacker: 108 COMPUTER VIRUSES AND MALWARE 114 Hasson [139] andCrackZ [81]. 1 15 See Rosenberg [268] for more information on this and single-stepping. 116 Hasson [139]. 117 Pless [ 254 ] talks ... found, and defenses to these weak- nesses are examined. Where possible, weaknesses and defenses are presented in a language- and architecture-independent way. 124 COMPUTE...
Ngày tải lên: 14/08/2014, 18:20
Computer Viruses and Malware phần 7 potx
... [126], Gragg [127], and Granger [128]. 150 COMPUTER VIRUSES AND MALWARE 136. 159 University of Calgary network Computer Science subnet Specific computer on subnet Figure 7.4. IP ... single command. And was, in the case from which the above 138 COMPUTER VIRUSES AND MALWARE hoax around, perceiving the purported threat as a way to justify an increas...
Ngày tải lên: 14/08/2014, 18:20
Computer Viruses and Malware phần 8 ppt
... on the Internet, and sends it along with the worm in compressed form. 158 COMPUTER VIRUSES AND MALWARE computer at the network's perimeter. The nature of this perimeter computer has been ... everything still works, just more slowly. 168 COMPUTER VIRUSES AND MALWARE 8.2.1 Honey pots Honeypots are computers that are meant to be compromised, computers which...
Ngày tải lên: 14/08/2014, 18:20
Computer Viruses and Malware phần 9 doc
... Chen and Heidemann [63]. 127 Jung et al. [ 156 ] and Ptacek and Newsham [ 256 ]. 128 Jung et al. [ 156 ] and Whyte et al. [3 45] . 186 COMPUTER VIRUSES AND MALWARE Notes for Chapter 9 1 The benevolent ... [212], and Provos and Honeyman [ 255 ]. 102 Arbaugh et al. [19] and Provos and Honeyman [ 255 ]. 103 These, and the disinfection options, are based on...
Ngày tải lên: 14/08/2014, 18:20