Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] Cabanas [See W32/Cabanas (virus)]cache bypass vulnerability W32/Blebla wormcache viruses [See disk cache viruses] calc.exe CALL-to-POP trick 2ndcalls system tracing 2nd canonicalization 2ndcaptures Linux/Slapper (worm) 2nd 3rd network traffic W32/Blaster (worm) 2nd W32/Sasser.D (worm) W32/Slammer (worm) 2nd 3rd W32/Welchia (worm)CARO (Computer Antivirus Researchers Organization) Cascade (virus) 2nd 3rd 4th nondestructive payload viruses self-protection technique 2nd X-RAY scanning cavity viruses (infection technique) 2nd 3rd CBAC (context-based access control) CC hack CEF file format 2ndcell phones worms on 2nd 3rd cellular automata [See also self-replicating systems] Edward Fredkin structures 2nd 3rd game of Life (Conway) 2nd 3rd 4th 5th 6th cellular automata (CA) computer architecturechain letters definition of 2ndchanged objects integrity checking Characteristics field (PE header)check bytes [See bookmarks]checksum API strings as self-protection technique 2nd CRC checksum detecting break points 2nd recalculation 2nd Checksum field (PE header)Cheeba (virus) self-protection technique Cheese (worm Chess, Dave 2nd Cheswick, Bill Chi, Darren CHRISTMA EXEC worm 2ndCisco routers [See also routers] classic parasitic viruses (infection technique) 2nd 3rdclean initial states integrity checkingcleaning goat files Clementi, Andreas cluster prepender infection methodcluster viruses file system dependency 2nd 3rd cluster-level stealth viruses 2nd 3rd CMOS viruses Codd, E.Fcodein active pages patching 2nd injected code detection shellcode blocking 2nd 3rd 4th 5th 6th 7th 8th malicious code analysis techniques architecture guides collection maintenance 2nd dedicated system installation 2nd Digital Immune System 2nd 3rd disassemblers 2nd 3rd 4th 5th dynamic analysis techniques 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th knowledge bases 2nd process of 2nd 3rd 4th 5th 6th 7th 8th unpacking 2nd Virus Analysis Toolkit (VAT) 2nd VMWARE 2nd quick examination of as process of computer virus analysis self-sending code blocking 2nd 3rd 4th 5thversus data in von Neumann machines code builders (infection technique) 2nd 3rdcode confusion [See obfuscated code] code emulation 2nd 3rd 4th dynamic decryptor detection 2nd encrypted/polymorphic virus detection 2nd 3rd 4th 5th metamorphic virus detection 2nd 3rd 4th 5th code emulation-based tunneling code evolution 2nd code injection attacks 2nd 3rd 4th CodeRed worm 2nd 3rd 4th code integration W95/Zmist virus 2nd code integration viruses (infection technique) 2nd 3rd code propagation techniques (worms) code injection attacks 2nd 3rd executable code-based attacks HTML-based mail links to Web sites or proxies 2nd 3rd remote login-based attacks 2nd shell code-based attacks 2nd 3rd 4th 5th code redirectioncode reviews buffer overflow attacks (worms)code section random entry point 2ndcode sections naming packing 2nd PE entry points sizes in header writeable flagCodeGreen (worm) competition between worms 2nd CodeRed (virus) CodeRed (worm) 2nd avoiding buffer overflow attacks competition between worms 2nd computer security versus antivirus programs detailed description of 2nd 3rd 4th history of blended attacks stack buffer overflows system modification attacks CodeRed_II (worm) Cohen, Fred Cohen, Frederic 2nd 3rd Cohen, Frederick definition of computer viruses 2nd history of antivirus programsCoke [See W32/Coke (virus)] collection (viruses) maintenance 2nd COM virusescombined attacks [See blended attacks]Commander_Bomber (virus) infection technique 2nd 3rd companion viruses companion viruses (infection technique) competition between viruses 2nd 3rdcompiler alignment areas recycling compiler dependency 2ndcompiler-level solutions buffer overflow attacks (worms) 2nd Microsoft Visual .NET 2003 (7.0 & 7.1) 2nd 3rd 4th ProPolice 2nd 3rd StackGuard 2nd 3rd 4th compressing viruses (infection technique) 2nd 3rdcompression as self-protection technique 2nd 3rd 4th PE file-infection techniques 2ndcompression viruses file system dependency Computer Antivirus Researchers Organization (CARO) computer architecture dependency 2ndcomputer security companies versus antivirus programs 2ndcomputer simulations of nature [See nature-simulation games] computer virus analysis, process of 2nd 3rd 4th 5th 6th 7th 8thcomputer virus research art versus science author's start in 2nd 3rd common patterns 2ndcomputer viruses code evolution 2nd definition of 2nd 3rd history of 2nd 3rdinfection techniques [See infection techniques] interactions competition 2nd 3rd cooperation 2nd 3rd sexual reproduction SWCP (simple worm communication protocol) modeling virus infections 2nd naming conventions 2nd !*vendor-specific_comment& #*packer& *family_name& 2nd *infective_length& *malware_type&:// *modifiers& *platform&/ 2nd 3rd 4th 5th 6th *variant& .*group_name& :*locale_specifier& @m @mm [*devolution&] retro viruses terminology 2nd 3rd 4th 5th 6th versus wormscomputer worms [See worms]computers modeling virus infections 2nd connections [See also network-level defense strategies] worm blocking techniques 2ndconstruction kits [See virus construction kits] contagion worms context-based access control (CBAC)control transfer with APIs 2ndConway, John Horton game of Life 2nd 3rd 4th 5th 6thcookies security_cookie values cooperation between viruses 2nd 3rd coprocessor instructions 2ndcopy-protection software extra disk sectors copycat worms [See also worm blocking techniques] Core War (game) 2nd 3rd 4th Core Wars Core Wars instructures (1994 revision) Corel Script viruses 2ndcorruption of macro viruses 2nd counterattacks CPU dependency 2ndCPU instructions undocumentedCPUs Win32 platform support CR0 control registers CRC checksums CreateFile() API 2nd CreateProcess() API Creeper (virus) cross-platform binary virusesCruncher (virus) infection technique Crypto API cryptographic detectioncryptography AIDS TROJAN DISK Trojan horseCryptor (virus) self-protection technique Csakany, Antal CSC/CSV (virus) CSC/PVT (virus) |