--
CCOM4995
Malware
2015-2016 - Semestre 2
--
Content
- 
malware t 
- 
anti anti-virus techniques 
- 
case study 
--
A definition
Malware = malicious software
Any program that works against the better interests of systems user or owner.
- 
As simple as displaying annoying info in your PC (addware) 
- 
As evil as stealing your data and identity. Commiting crimes on your behalf. 
--
Reverse Engineering to the rescue!
- 
you won't receive a malware's source code by email to let you understand it 
- 
RE (along with monitoring tools) allows you to understannd the malware's modus operandi - learns its weaknesses
- device antivirus techniques
 
--
Some malware cathegories
Viruses: * self-replicating. * before the Internet, required some type of human intervention to spread from computer to computer * once they gain access to the computer they make copies of themselves inside other executables.
Worms: * Example: Code Red Worm: exploited vulnerability in Windows Server Internet Service API. * also self-replicating but do not requiere user intervention * why use a human, when network is at your disposal * hide themselves as ___ data packets * other example: mass mailing worms
Trojan Horse: * seemingly innocent file that contains malicious code * when run: may exhibit normal lawfull behavior while doing its bad deeds in the background
http://ccom.uprrp.edu/prog_outcomes.php
- 
Intellectual curiosity and capacity for independent study 
- 
Creative and analytic ability, and capacity for logical reasoning 
- 
Effective use of mathematical language and ability to develop elementary proofs. 
- 
Ability to develop, analyze and evaluate algorithms for solving problems or performing tasks. 
- 
Ability to translate algorithms and data structures to software. 
- 
Understanding of the limitations of computing, in particular, the difference between what inherently cannot be computed versus what can be achieved through advances in science and technology.