See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/305469492 Handbook of Malware 2016 - A Wikipedia Book Book · July 2016 DOI: 10.13140/RG.2.1.5039.5122 CITATIONS READS 0 13,014 2 authors, including: Reiner Creutzburg Brandenburg University of Applied Sciences 489 PUBLICATIONS 472 CITATIONS SEE PROFILE Some of the authors of this publication are also working on these related projects: NDT CE – Assessment of structures || ZfPBau – ZfPStatik View project 14. Nachwuchswissenschaftlerkonferenz Ost- und Mitteldeutscher Fachhochschulen (NWK 14) View project All content following this page was uploaded by Reiner Creutzburg on 20 July 2016. The user has requested enhancement of the downloaded file. Handbook of Malware 2016 A Wikipedia Book By Wikipedians Edited by: Reiner Creutzburg Technische Hochschule Brandenburg Fachbereich Informatik und Medien PF 2132 D-14737 Brandenburg Germany Email: [email protected] Contents 1 Malware - Introduction 1 1.1 Malware .................................................. 1 1.1.1 Purposes ............................................. 1 1.1.2 Proliferation ........................................... 2 1.1.3 Infectious malware: viruses and worms ............................. 3 1.1.4 Concealment: Viruses, trojan horses, rootkits, backdoors and evasion .............. 3 1.1.5 Vulnerability to malware ..................................... 4 1.1.6 Anti-malware strategies ..................................... 5 1.1.7 Grayware ............................................. 6 1.1.8 History of viruses and worms .................................. 6 1.1.9 Academic research ........................................ 7 1.1.10 See also .............................................. 7 1.1.11 References ............................................ 7 1.1.12 External links ........................................... 10 2 Infectious Malware 11 2.1 Computer virus .............................................. 11 2.1.1 Historical development ...................................... 11 2.1.2 Operations & functions of a virus ................................ 13 2.1.3 Infection targets and replication techniques ........................... 13 2.1.4 Stealth strategies ......................................... 14 2.1.5 Vulnerabilities and infection vectors ............................... 15 2.1.6 Countermeasures ......................................... 16 2.1.7 See also .............................................. 18 2.1.8 References ............................................ 18 2.1.9 Further reading .......................................... 21 2.1.10 External links ........................................... 22 2.2 Comparison of computer viruses ..................................... 22 2.2.1 Scope ............................................... 22 2.2.2 Comparison of viruses and related programs ........................... 22 i ii CONTENTS 2.2.3 See also .............................................. 23 2.2.4 References ............................................ 23 2.2.5 External links ........................................... 23 2.3 Computer worm .............................................. 23 2.3.1 History .............................................. 24 2.3.2 Protecting against dangerous computer worms .......................... 24 2.3.3 Worms with good intent ..................................... 24 2.3.4 See also .............................................. 25 2.3.5 References ............................................ 25 2.3.6 External links ........................................... 25 2.4 List of computer worms .......................................... 26 2.4.1 See also .............................................. 26 2.5 Timeline of computer viruses and worms ................................. 26 2.5.1 1949 ............................................... 26 2.5.2 1970–1979 ............................................ 26 2.5.3 1980–1989 ............................................ 27 2.5.4 1990–1999 ............................................ 28 2.5.5 2000–2009 ............................................ 29 2.5.6 2010 and later .......................................... 32 2.5.7 See also .............................................. 33 2.5.8 References ............................................ 33 2.5.9 External links ........................................... 35 3 Concealment 36 3.1 Trojan horse (computing) ......................................... 36 3.1.1 Purpose and uses ......................................... 36 3.1.2 Notable examples ......................................... 37 3.1.3 See also .............................................. 37 3.1.4 References ............................................ 38 3.1.5 External links ........................................... 38 3.2 Rootkit .................................................. 38 3.2.1 History .............................................. 39 3.2.2 Uses ................................................ 40 3.2.3 Types ............................................... 40 3.2.4 Installation and cloaking ..................................... 43 3.2.5 Detection ............................................. 43 3.2.6 Removal .............................................. 45 3.2.7 Public availability ......................................... 45 3.2.8 Defenses ............................................. 45 CONTENTS iii 3.2.9 See also .............................................. 46 3.2.10 Notes ............................................... 46 3.2.11 References ............................................ 46 3.2.12 Further reading .......................................... 48 3.2.13 External links ........................................... 49 3.3 Backdoor (computing) ........................................... 49 3.3.1 Overview ............................................. 49 3.3.2 Compiler backdoors ........................................ 51 3.3.3 List of known backdoors ..................................... 52 3.3.4 See also .............................................. 52 3.3.5 References ............................................ 52 3.3.6 External links ........................................... 53 3.4 Zombie (computer science) ........................................ 53 3.4.1 History .............................................. 53 3.4.2 See also .............................................. 54 3.4.3 References ............................................ 54 3.4.4 External links ........................................... 54 3.5 Man-in-the-middle attack ......................................... 55 3.5.1 Example ............................................. 55 3.5.2 Defences against the attack .................................... 56 3.5.3 Forensic analysis ......................................... 56 3.5.4 Quantum cryptography ...................................... 57 3.5.5 Beyond cryptography ....................................... 57 3.5.6 Implementations ......................................... 57 3.5.7 See also .............................................. 57 3.5.8 References ............................................ 58 3.5.9 External links ........................................... 58 3.6 Man-in-the-browser ............................................ 58 3.6.1 Description ............................................ 58 3.6.2 Examples ............................................. 58 3.6.3 Protection ............................................. 58 3.6.4 Related attacks .......................................... 59 3.6.5 See also .............................................. 60 3.6.6 References ............................................ 60 3.6.7 External links ........................................... 61 3.7 Clickjacking ................................................ 61 3.7.1 Description ............................................ 61 3.7.2 Examples ............................................. 61 iv CONTENTS 3.7.3 Prevention ............................................. 62 3.7.4 See also .............................................. 63 3.7.5 References ............................................ 63 3.7.6 External links ........................................... 64 4 Malware for Profit 65 4.1 Privacy-invasive software ......................................... 65 4.1.1 Background ............................................ 65 4.1.2 Definition ............................................. 65 4.1.3 Problem with the spyware concept ................................ 65 4.1.4 Introducing the term, “privacy-invasive software” ........................ 66 4.1.5 Comparison to malware ..................................... 67 4.1.6 History .............................................. 67 4.1.7 Predicted future development .................................. 68 4.1.8 References ............................................ 69 4.2 Adware .................................................. 70 4.2.1 Advertising-supported software ................................. 70 4.2.2 As malware ............................................ 71 4.2.3 See also .............................................. 71 4.2.4 Notes ............................................... 71 4.2.5 References ............................................ 71 4.3 Spyware .................................................. 73 4.3.1 Routes of infection ........................................ 73 4.3.2 Effects and behaviors ....................................... 74 4.3.3 Remedies and prevention ....................................
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages232 Page
-
File Size-