Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] ABAP viruses ABAP/Rivpas (virus)access context-based access control (CBAC) counterattacks Dumaru (worm) early warning systems firewalls 2nd 3rd 4th honeypot systems 2nd 3rd network intrusion detection system (NIDS) 2nd router access lists 2nd 3rd worm behavior patterns 2nd 3rd 4th 5th 6th 7th 8th 9th 10th access control lists (ACLs) access control systems 2nd accidentally destructive payload viruses ACG (Amazing Code Generator) virus ACG (virus) code emulation 2nd disassembling heuristics self-protection technique ACLs (access control lists)Acrobat PDF viruses 2nd ActionScript viruses 2ndactivation methods [See payload activation]active instructions tracking active pages, patching code in 2nd ActiveX control rights verificationActiveX controls safe-for-scripting 2ndsafe-for-scripting controls VBS/BubbleBoy worm 2nd W32/Blebla worm 2ndaddress virtual address spaces (Windows NT) 2nd 3rd 4th 5th 6th 7th Address Resolution Protocol (ARP) requests address-book wormsaddresses GOT/IAT page attributesspaces process randomization return-to-LIBC attacks 2nd 3rd 4th upper 2G of address space (memory scanning) user address space of processes (scanning)virtual translation of AddressOfEntryPoint field (PE header) Adleman, LeonardADM (worm) avoiding buffer overflow attacksadministration memory 2nd Virtual Memory ManagerAdmiral Bailey (virus writer) IVP (Instant Virus Production Kit)Adobe Acrobat PDF viruses 2nd Adore (rootkit) Advanced Heuristic Disinfector (AHD)adware definition of 2nd AHD (Advanced Heuristic Disinfector) AIDS Information Diskette (Trojan horse) AIDS TROJAN DISK (Trojan horse)Alcopaul (virus writer) W32/Sand.12300 virusalerts DeepSightalgorithmic detection metamorphic viruses algorithmic scanning methods 2nd 3rd filtering 2nd 3rd static decryptor detection 2nd 3rd X-RAY method 2nd 3rd 4th 5thalgorithms Boyer-Moore Aliz (worm) ALS/Burstead (virus) altering module Amazing Code Generator (ACG) virus AmiPro viruses 2nd Amoeba (infection technique) 2ndanalysis malicious code analysis techniques architecture guides collection maintenance 2nd dedicated system installation 2nd Digital Immune System 2nd 3rd disassemblers 2nd 3rd 4th 5th dynamic analysis techniques 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th knowledge bases 2nd process of 2nd 3rd 4th 5th 6th 7th 8th unpacking 2nd Virus Analysis Toolkit (VAT) 2nd VMWARE 2nd Anarchy.6093 (virus) ANIMAL (game) "Anna Kornikova" virus Anna Kournikova virusANSI.SYS drivers reconfiguring key functions 2nd Anthrax (virus)Anti-AVP (virus) self-protection technique ANTI-VIR.DAT file (antivirus program) AntiCMOS (virus) antidebugging techniques (armored viruses) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th antidisassembly techniques (armored viruses) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th antiemulation techniques (armored viruses) 2nd 3rd 4th 5th 6thAntiEXE (virus) somewhat destructive payload viruses antigoat techniques (armored viruses) 2nd antiheuristics techniques (armored viruses) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th AntiPascal (virus) antivirus defense techniques 2nd antivirus programs [See also disinfection methods] "Are you there?" calls behavior-blocking programs half-cooked repairs history of 2nd integrity checker programs modeling virus infections 2nd scanning versus computer security companies 2ndantivirus software disabling with retroviruses 2nd 3rd testers vendor contact information antivirus viruses API hooking (infection technique) 2nd 3rd API strings 2ndAPIs control transfer 2nd AplS/Simpsons@mm (worm) APM/Greenstripe (virus)appending viruses CALL-to-POP trick 2nd appending viruses (infection technique) 2nd 3rd 4th 5th 6th AppleScript viruses 2nd application rights verificationapplications algorithmic scanning methods 2nd 3rd filtering 2nd 3rd static decryptor detection 2nd 3rd X-RAY method 2nd 3rd 4th 5th antivirus defense techniques 2nd code emulation 2nd 3rd 4th dynamic decryptor detection 2nd encrypted/polymorphic virus detection 2nd 3rd 4th 5th disinfection methods 2nd 3rd 4th generic decryptors 2nd heuristics for generic repair 2nd standard 2nd 3rd first-generation antivirus scanners bookmarks 2nd entry-point scanning 2nd fixed-point scanning 2nd generic detection hashing 2nd hyperfast disk access mismatches string scanning 2nd 3rd top-and-tail scanning wildcards 2ndheuristic analysis of 32-bit Windows viruses 2nd 3rd 4th 5th 6th using neural networks 2nd 3rd metamorphic virus detection code emulation 2nd 3rd 4th 5th disassembling techniques 2nd geometric detection 2nd second-generation antivirus scanners exact identification 2nd 3rd nearly-exact identification 2nd skeleton detection smart scanning 2ndviruses access control systems 2nd behavior blocking 2nd 3rd 4th inoculation 2nd integrity checking 2nd 3rd 4th sand-boxing 2ndarchitecture dependency [See computer architecture dependency] architecture guides, malicious code analysis techniques archive format dependency 2nd "Are you there?" calls (self-detection techinque) arenas (sections of memory) armored viruses antidebugging techniques 2nd 3rd 4th 5th 6th 7th 8th 9th 10th antidisassembly techniques 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th antiemulation techniques 2nd 3rd 4th 5th 6th antigoat techniques 2nd antiheuristics techniques 2nd 3rd 4th 5th 6th 7th 8th 9th 10th ARP (Address Resolution Protocol) requestsart versus science "Art of the Fugue" (Bach) ASPACK (run-time packer) Atkinson, Billattachment inserters worm infectionsattacks against memory scanning 2nd algorithmic scanning methods 2nd 3rd filtering 2nd 3rd static decryptor detection 2nd 3rd X-RAY method 2nd 3rd 4th 5th antivirus defense techniques 2ndblended attacks [See blended attacks]buffer overflow attacks [See buffer overflow attacks] code emulation 2nd 3rd 4th dynamic decryptor detection 2nd encrypted/polymorphic virus detection 2nd 3rd 4th 5th code injection attacks 2nd 3rd 4th dictionary attacks DoS DoS (denial of service) attacks 2nd e-mail worm attacks 2nd executable code-based attacks file parsing attacks 2nd first-generation antivirus scanners bookmarks 2nd entry-point scanning 2nd fixed-point scanning 2nd generic detection hashing 2nd hyperfast disk access mismatches string scanning 2nd 3rd top-and-tail scanning wildcards 2nd future 2nd 3rd 4thheuristic analysis of 32-bit Windows viruses 2nd 3rd 4th 5th 6th using neural networks 2nd 3rd injected code detection shellcode blocking 2nd 3rd 4th 5th 6th 7th 8th instant messaging attacks 2nd Linux/Slapper metamorphic virus detection code emulation 2nd 3rd 4th 5th disassembling techniques 2nd geometric detection 2nd network share enumeration 2nd 3rd network-level defense strategies 2nd counterattacks early warning systems firewalls 2nd 3rd 4th honeypot systems 2nd 3rd network intrusion detection system (NIDS) 2nd router access lists 2nd 3rd worm behavior patterns 2nd 3rd 4th 5th 6th 7th 8th 9th 10th NNTP attacks password-capturing attacks peer-to-peer network attacks 2nd phishing attacks 2nd 3rd remote login-based attacks 2nd return-to-LIBC 2nd 3rd 4th 5th second-generation antivirus scanners exact identification 2nd 3rd nearly-exact identification 2nd skeleton detection smart scanning 2nd shell code-based attacks 2nd 3rd 4th 5th SMTP proxy-based attacks 2nd 3rd SMTP-based attacks 2nd 3rd 4th 5th 6th stack smashing vampire attacks worms [See also worm blocking techniques]attributes GOT/IAT pageauthenticated updates worm infections 2nd 3rd 4th 5th 6th 7thauto-rooters definition of AutoLisp viruses 2nd automata 2nd [See also cellular automata] [See also self-replicating systems] automated analysis, Digital Immune System 2nd 3rd automated exploit discovery 2nd AUTORUN.INF file viruses 2nd AV-Test.org AVP (antivirus software)Azusa (virus) infection technique |