Computer Viruses and Malware phần 9 doc

Computer Viruses and Malware phần 9 doc

Computer Viruses and Malware phần 9 doc

... [63]. 127 Jung et al. [156] and Ptacek and Newsham [256]. 128 Jung et al. [156] and Whyte et al. [345]. 186 COMPUTER VIRUSES AND MALWARE Notes for Chapter 9 1 The benevolent effect may ... the design of malware for information warfare, so that it doesn't start targeting the computers of the original attacker and their allies. ^^^ 198 COMPUTER VIRUSES...

Ngày tải lên: 14/08/2014, 18:20

23 310 0
Computer Viruses and Malware phần 1 pps

Computer Viruses and Malware phần 1 pps

... Benevolent Malware 177 9. 2 Spam 178 9. 3 Access-for-Sale Worms 1 79 9. 4 Cryptovirology 181 9. 5 Information Warfare 182 9. 6 Cyberterrorism 185 10. PEOPLE AND COMMUNITIES 1 89 10.1 Malware Authors ... Authors 1 89 10.1.1 Who? 1 89 10.1.2 Why? 190 10.2 The Anti-Virus Community 191 10.2.1 Perceptions 192 10.2.2 Another Day in Paradise 192 10.2.3 Customer Demands 194 1...

Ngày tải lên: 14/08/2014, 18:20

24 361 0
Computer Viruses and Malware phần 2 ppsx

Computer Viruses and Malware phần 2 ppsx

... - Cohen's virus woric 198 8 - Internet worm 196 9 - Moon landing 198 1 - IBM PC introduced 199 1 -Web invented Figure 2.2. Timeline of events Definitions and Timeline 15 ant in a non-virtual ... the mid- 198 0s, leaving us with lots of threats - no matter how they're counted. 196 9 - Benford's viruses 197 2 - Trojan horses known C.I 98 0 - Xerox worm expe...

Ngày tải lên: 14/08/2014, 18:20

23 356 0
Computer Viruses and Malware phần 3 ppt

Computer Viruses and Malware phần 3 ppt

... Kaspersky [1 59, 160]. Interestingly, the 196 1 Darwin players tried an ex- periment with such multi-part programs, and declared the experiment a 'flop' [201]. 48 COMPUTER VIRUSES AND MALWARE ... value 0, for instance [ 198 ]. 7 This technique was employed for viruses back in 198 7 [95 ], and is still in use [27, 58]. 8 Having said that, Zmist does it [106]....

Ngày tải lên: 14/08/2014, 18:20

23 502 0
Computer Viruses and Malware phần 4 pps

Computer Viruses and Malware phần 4 pps

... polymorphic viruses. A histogram can also be used to detect metamorphic viruses by comparing the emulation histogram to histograms of known metamorphic viruses. ^^^ 64 COMPUTER VIRUSES AND MALWARE ... hash table 80 COMPUTER VIRUSES AND MALWARE Static heuristics • Pro: Static heuristic analysis detects both known and unknown viruses. • Con: False positives are a...

Ngày tải lên: 14/08/2014, 18:20

23 337 0
Computer Viruses and Malware phần 5 ppsx

Computer Viruses and Malware phần 5 ppsx

... 190 See [42, 200]. 191 Zenkin [354]. 192 See [61, 175] (signature scanning), [61,1 69] (static heuristics), [341, 354] (behavior blocking), and [ 69] (emulation). 193 Bontchev [43]. 194 ... instruc- tion is executed, the CPU posts an interrupt which the debugger handles. 92 COMPUTER VIRUSES AND MALWARE Notes for Chapter 4 1 And the rest of the quote: 'Unf...

Ngày tải lên: 14/08/2014, 18:20

23 485 0
Computer Viruses and Malware phần 6 pptx

Computer Viruses and Malware phần 6 pptx

... an attacker: 108 COMPUTER VIRUSES AND MALWARE 114 Hasson [1 39] andCrackZ [81]. 115 See Rosenberg [268] for more information on this and single-stepping. 116 Hasson [1 39] . 117 Pless [254] ... found, and defenses to these weak- nesses are examined. Where possible, weaknesses and defenses are presented in a language- and architecture-independent way. 124 COMPUTER...

Ngày tải lên: 14/08/2014, 18:20

23 413 0
Computer Viruses and Malware phần 7 potx

Computer Viruses and Malware phần 7 potx

... usernames and passwords. 140 COMPUTER VIRUSES AND MALWARE 16 For example, Chan et al. [60] apply an evolutionary learning algorithm to testing the game AI in Electronic Arts' FIFA -99 game. ... Gragg [127], and Granger [128]. 150 COMPUTER VIRUSES AND MALWARE 136.1 59 University of Calgary network Computer Science subnet Specific computer on subne...

Ngày tải lên: 14/08/2014, 18:20

23 293 0
Computer Viruses and Malware phần 8 ppt

Computer Viruses and Malware phần 8 ppt

... more slowly. 168 COMPUTER VIRUSES AND MALWARE 8.2.1 Honey pots Honeypots are computers that are meant to be compromised, computers which may be either real or emulated. Early documented examples ... along with the worm in compressed form. 158 COMPUTER VIRUSES AND MALWARE computer at the network's perimeter. The nature of this perimeter computer has been left...

Ngày tải lên: 14/08/2014, 18:20

23 364 0
w