Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
7Activity
0 of .
Results for:
No results containing your search query
P. 1
Malware

Malware

Ratings:

5.0

(1)
|Views: 457|Likes:
Published by euverve
Reversing a malware. What is Malware?
Reversing a malware. What is Malware?

More info:

Published by: euverve on Jan 21, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF or read online from Scribd
See more
See less

07/18/2012

 
SoftWindows11/23/05Distributed Objects1
Reverse Engineering (Reversing Malware)Reverse Engineering (Reversing Malware)
© SERG
 Reversing Malware
[based on material from the textbook]
Reverse Engineering (Reversing Malware)Reverse Engineering (Reversing Malware)
© SERG
What is Malware?
Malware (malicious software) is any program thatworks against the interest of the system’s user or owner.
Question:
Is a program that spies on the web browsing habits of the employees of a companyconsidered malware?What if the CEO authorized the installation of thespying program?
Reverse Engineering (Reversing Malware)Reverse Engineering (Reversing Malware)
© SERG
 Reversing Malware
Revering is the strongest weapon we haveagainst the creators of malware.Antivirus researchers engage in reversingin order to:
 – analyze the latest malware, – determine how dangerous the malware is, – learn the weaknesses of malware so thateffective antivirus programs can be developed.
 
SoftWindows11/23/05Distributed Objects2
Reverse Engineering (Reversing Malware)Reverse Engineering (Reversing Malware)
© SERG
Uses of Malware
Why do people develop and deploymalware?
 – Financial gain – Psychological urges and childish desires to“beat the system”. – Access private data – 
Reverse Engineering (Reversing Malware)Reverse Engineering (Reversing Malware)
© SERG
Typical Purposes of Malware
Backdoor access:
 – Attacker gains unlimited access to the machine.
Denial-of-service (DoS) attacks:
 – Infect a huge number of machines to try simultaneously toconnect to a target server in hope of overwhelming it and makingit crash.
Vandalism:
 – E.g., defacing a web site.
Resource Theft:
 – E.g., stealing other user’s computing and network resources, suchas using your neighbors’ Wireless Network.
Information Theft:
 – E.g., stealing other user’s credit card numbers
.
Reverse Engineering (Reversing Malware)Reverse Engineering (Reversing Malware)
© SERG
Types of Malware
VirusesWormsTrojan HorsesBackdoorsMobile codeAdwareSticky software
 
SoftWindows11/23/05Distributed Objects3
Reverse Engineering (Reversing Malware)Reverse Engineering (Reversing Malware)
© SERG
Viruses
Viruses are self-replicating programs thatusually have a malicious intent.Old fashioned type of malware that has become less popular since the widespreaduse of the Internet.The unique aspect of computer viruses istheir ability to self-replicate.However, someone (e.g., user) mustexecute them in order for them to propagate.
Reverse Engineering (Reversing Malware)Reverse Engineering (Reversing Malware)
© SERG
Viruses (Cont’d)
Some viruses are harmful (e.g.,):
 – delete valuable information from a computer’sdisk, – freeze the computer.
Other viruses are harmless (e.g.,):
 – display annoying messages to attract user attention, –  just replicate themselves.
Reverse Engineering (Reversing Malware)Reverse Engineering (Reversing Malware)
© SERG
Viruses: Operation
Viruses typically attach themselves toexecutable program files
 – e.g.,
.exe
files in MS Windows
Then the virus slowly duplicates itself intomany executable files on the infectedsystem.Viruses require human intervention toreplicate.

Activity (7)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Richie Pecker liked this
Angz liked this
smd davis liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->