--
CCOM4995
Malware
2015-2016 - Semestre 2
--
Content
-
malware t
-
anti anti-virus techniques
-
case study
--
A definition
Malware = malicious software
Any program that works against the better interests of systems user or owner.
-
As simple as displaying annoying info in your PC (addware)
-
As evil as stealing your data and identity. Commiting crimes on your behalf.
--
Reverse Engineering to the rescue!
-
you won't receive a malware's source code by email to let you understand it
-
RE (along with monitoring tools) allows you to understannd the malware's modus operandi
- learns its weaknesses
- device antivirus techniques
--
Some malware cathegories
Viruses: * self-replicating. * before the Internet, required some type of human intervention to spread from computer to computer * once they gain access to the computer they make copies of themselves inside other executables.
Worms: * Example: Code Red Worm: exploited vulnerability in Windows Server Internet Service API. * also self-replicating but do not requiere user intervention * why use a human, when network is at your disposal * hide themselves as ___ data packets * other example: mass mailing worms
Trojan Horse: * seemingly innocent file that contains malicious code * when run: may exhibit normal lawfull behavior while doing its bad deeds in the background
http://ccom.uprrp.edu/prog_outcomes.php
-
Intellectual curiosity and capacity for independent study
-
Creative and analytic ability, and capacity for logical reasoning
-
Effective use of mathematical language and ability to develop elementary proofs.
-
Ability to develop, analyze and evaluate algorithms for solving problems or performing tasks.
-
Ability to translate algorithms and data structures to software.
-
Understanding of the limitations of computing, in particular, the difference between what inherently cannot be computed versus what can be achieved through advances in science and technology.