Introduction to (Malware) MALICIOUS CODE

Introduction to (Malware) MALICIOUS CODE

MALICIOUS CODE - some observations • Definition: Malicious code is any code added, changed or removed from a software system in order to intentionally cause harm or subvert the intended function of the system. Introduction to • “If you let somebody else execute code on your computer, MALICIOUS CODE then it is not your own computer” • Malicious code can be many things: viruses, worms, trojan (Malware) horses, rabbits, etc etc • Note that from a technical/scientific viewpoint: malicious code is “normal” code!! • Thus: the malware problem is a software problem. MALICIOUS CODE - some recent trends MALICIOUS CODE - reasons for increase • there are a few trends that largely influence the wide • previously malware was normally of one specific kind. spread of malicious code: Nowadays, it is “multifunctional” and very complicated. • Growing number and connectivity of computers • all kinds of malware tend to be called “virus”. - “everybody” is connected and dependant on computers • Top 6 (2004): - the number of attacks increase Bagle, Mydoom, Netsky, Sasser, Kargo and Sober (2004) - attacks can be launched easily (automated attacks) • Most viruses today are non-destructive. • Growing system complexity - unsafe programming languages • Rather they try to take control over your computer, so that - heterogenity it can be used for other, malicious purposes, a zombie, - hiding code is easy e.g. to distribute spam. - verification and validation is impossible (let alone proofs) (It is claimed that 70% of all email today is spam.) • Systems are easily extensible - mobile code, dynamically loadable modules - incremental evolution of systems TYPES OF MALICIOUS CODE TYPES OF MALICIOUS CODE • Traditional virus (1988) • Hoax virus - attaches to existing program code - is no virus at all. It is an email with a bogus warning - intervenes in normal execution • Rabbit (bacteria, greedy programs) - replicates and propagates - is a virus (or worm) that replicates without bound, • Document virus (macro virus) thus exhausting some computing resource. Does not - highly formatted documents include commands (+data) spread to other systems. (attacks availability only) • Stealth virus • Worm (1975, 1982) - hides the modifications it has made in the system, - is a stand-alone program that replicates and spreads normally by monitoring system calls and forging the copies of itself via the network. Non-trivial to make. results of such calls • Trojan Horse • Polymorphic virus - is a “normal” program that contains some hidden - avoids virus scanners by producing multiple variant functionality, that is unwanted by the user. of itself or encrypting itself. TYPES OF MALICIOUS CODE MALICIOUS CODE - IMPLEMENTATION METHODS • Logic bomb • Attack script - malware that triggers on a condition and “detonates” - is a program that exploit some security weakness to carry out an attack. • Time bomb - malware that triggers on a time condition and “detonates • Java attack applet - is a program that is embeeded in Web page. • Trap door (Back door) - spreads through web browsers - is an undocumented and unknown (to the user) entry point to a system. • ActiveX control - it is normally inserted during the system design phase - is a Microsoft version of a Java applet - could be put there for a useful purpose (trouble shooting, - it is much more powerful that the Java applet testing, maintenance, but left by mistake. - ActiveX controls are extremely dangerous if used for • Salami attack malicious purposes - acheiving some economic benefit but making a large number of insignificant changes, e.g rounding errors..

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    2 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us