Lecture 5: Malware

Terms you should know

Paul Krzyzanowski

October 8, 2020

- Malware - Worm - Virus - Spyware - Backdoor - Ransomware - Exfiltration - Keylogger - Windows Hooks - Logic Bomb - Dropper - Zero-day Exploit - File Infector - Infected flash - Autorun - Data leakage - Macro Viruses - Social Engineering - Phishing - Smishing - Spear Phishing - Hiding Malicious URLs - Startup Services - Bootkit - Trojan Horse - Overt vs. Covert Porpose
- Rootkit - Kernel-mode, User-mode, and Hypervisor Rootkits - Signature-based Detection - Behavior-based Detection (Heuristic Analysis) - Signature Scanning - Virus Defenses - Encryption - Packing - Packer - Polymorphic Virus - Static Heuristic Analysis - Dynamic Heuristic Analysis - Sandbox - System call Interposition - Problems with Janus Sandboxing - TOCTTOU - Kernel-based Sandoxing - seccomp-BPF - Browser-based sandboxing - NaCl static analysis - Inner and Outer Sandbox - Java Bytecode Verifier - Java Class Loader - Java Security Manager
Last modified October 8, 2020.
recycled pixels