Lecture 5: Malware
Terms you should know
Paul Krzyzanowski
October 8, 2020
- Malware
- Worm
- Virus
- Spyware
- Backdoor
- Ransomware
- Exfiltration
- Keylogger
- Windows Hooks
- Logic Bomb
- Dropper
- Zero-day Exploit
- File Infector
- Infected flash
- Autorun
- Data leakage
- Macro Viruses
- Social Engineering
- Phishing
- Smishing
- Spear Phishing
- Hiding Malicious URLs
- Startup Services
- Bootkit
- Trojan Horse
- Overt vs. Covert Porpose
- Rootkit
- Kernel-mode, User-mode, and Hypervisor Rootkits
- Signature-based Detection
- Behavior-based Detection (Heuristic Analysis)
- Signature Scanning
- Virus Defenses
- Encryption
- Packing
- Packer
- Polymorphic Virus
- Static Heuristic Analysis
- Dynamic Heuristic Analysis
- Sandbox
- System call Interposition
- Problems with Janus Sandboxing
- TOCTTOU
- Kernel-based Sandoxing
- seccomp-BPF
- Browser-based sandboxing
- NaCl static analysis
- Inner and Outer Sandbox
- Java Bytecode Verifier
- Java Class Loader
- Java Security Manager