Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] DAC (discretionary access control systems)Dark Angel (virus writer) PS-MPC virus construction kit Dark Avenger (virus writer) Commander_Bomber virus 2nd 3rd MtE (mutation engine) 2nd 3rd Number_Of_The_Beast virusDark Avenger (virus) self-protection technique Dark_Avenger (virus) Dark_Avenger.1800.A (virus) self-protection techniqueDarkman (virus writer) W2K/Installer virus Darkness (virus)DarkParanoid (virus) memory scanning attacks Darth_Vader (virus) infection technique system buffer viruses Darwin (game)dataversus code in von Neumann machines data diddler viruses 2nd Data FellowsData Rescue's IDA [See IDA (disassembler)] data stealing viruses 2nd 3rd 4th 5th date and time dependency 2ndDBR (DOS BOOT record) infection techniques 2nd 3rd DCL viruses 2nd DDoS (distributed denial of service) attacks de Wit, Jandeactivation of filter driver viruses 2nd 3rddead virus code reviving DEBUG commandDEBUG command (sendmail) Morris wormdebug interfaces tracing with 2nddebug registers clearing debugger dependency 2nd 3rddebuggers antidebugging techniques (armored viruses) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th debugging 2nd 3rd 4th 5thDEC/VMS systems DCL viruses 2nddeception e-mail worm attacks 2nddecoders packets decryption [See also encryption] backward decryption disassemblers 2nd 3rd 4th 5th nonlinear decryption RDA viruses with stack pointer (SP)decryptors dynamic detection 2nd generic 2nd static detection 2nd 3rd trackingdedicated virus analysis systems installation of 2nd VMWARE 2nd DeepSight alertsDemon Emperor (virus writer) Hare virus 2ndDen_Zuko (virus) competition between viruses denial of service (DoS) attacks 2nd 3rd 4thDenzuko (virus) infection techniquedependencies archive format dependency 2nd compiler and linker dependency 2nd computer architecture dependency 2nd CPU dependency 2nd date and time dependency 2nd debugger dependency 2nd 3rd device translator layer dependency 2nd 3rd 4th 5th embedded object insertion dependency 2nd extension dependency 2nd 3rd file format dependency 2nd 3rd 4th 5th 6th 7th 8th 9th 10th file system dependency 2nd 3rd 4th host size dependency 2nd interpreted environment dependency 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th JIT dependency 2nd 3rd language dependency of macro viruses 2nd multipartite viruses 2nd network protocol dependency operating system dependency 2nd operating system version dependency 2nd platform dependency of macro viruses 2nd Registry-dependent viruses 2nd resource dependency 2nd self-contained environment dependency 2nd 3rd 4th source code dependency 2nd vulnerability dependencydestructive payload viruses highly destructive payloads 2nd 3rd 4th 5th 6th 7th somewhat destructive payloads 2nd 3rddetection active viruses in memory cryptographic direct library function invocations 2nd 3rd dynamic decryptor 2nd engines first-generation antivirus scanners bookmarks 2nd entry-point scanning 2nd fixed-point scanning 2nd generic hashing 2nd hyperfast disk access mismatches string scanning 2nd 3rd top-and-tail scanning wildcards 2nd geometric 2nd injected code shellcode blocking 2nd 3rd 4th 5th 6th 7th 8th network intrusion detection system (NIDS) 2nd network-intrusion detection system (NIDS) second-generation antivirus scanners exact identification 2nd 3rd nearly-exact identification 2nd skeleton smart scanning 2nd static decryptor 2nd 3rd threads 2nd 3rd 4th device driver viruses 2nd device translator layer dependency 2nd 3rd 4th 5th devolution of macro viruses 2nd Dewdney, A.Kdialers definition of dictionary attacks Digital Immune System 2nd 3rd Digital Millennium Copyright Act (DMCA) DIR-II (virus) direct library function invocations, detection of 2nd 3rd direct-action viruses 2nddirectories page (memory) directory stealth viruses 2nd 3rd 4th dirty memory pages disassemblers antidisassembly techniques (armored viruses) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th malicious code analysis techniques 2nd 3rd 4th 5thdisassembling techniques metamorphic virus detection 2nd discovery of automated exploits 2nd discretionary access control systems (DAC)disinfection [See antivirus programs] memory scanning 2nd loaded DLLs patching code in active pages 2nd process termination thread termination 2nd 3rd 4th disinfection methods 2nd 3rd 4th 5th [See also antivirus programs] generic decryptors 2nd heuristics for generic repair 2nd standard 2nd 3rddisk access with port I/O 2nd disk cache viruses 2nd 3rd Disk Killer (virus) infection technique Dispatch routine of DeactivatorDrivers distributed denial of service (DDoS) attacks divide-by-zero exceptions DLL viruses 2nd 3rdDLLs disinfecting linking to executables 2nd 3rd 4th DMCA (Digital Millennium Copyright Act) Donut (virus) Doomed (game)Doomjuice (worm) cooperation with virusesDOS behavior blocking cluster and sector-level stealth viruses 2nd 3rd COM viruses EPO (entry-point obscuring) viruses 2nd 3rd 4th 5th 6th 7th EXE viruses 2nd full-stealth viruses 2nd interrupt hooking 2nd 3rd 4th 5th on INT 13h (boot viruses) 2nd 3rd on INT 21h (file viruses) 2nd 3rd 4thmemory-resident viruses installation 2nd 3rd self-detection techniques 2nd metamorphic viruses server function call system buffer viruses TSR (Terminate-and-Stay-Resident) programs 2nd undocumented interrupt (Int 21h/52h function) DoS (denial of service) attacks 2nd 3rd 4thDoS attacks against Windows Update Web siteDOS BOOT record (DBR) infection techniques 2nd 3rdDOS stub in PE header "double extensions"down-conversion of macro viruses 2nddownloaders definition ofDoxtor L (virus writer) W32/Idele virus DR. DR. STROBE & PAPA HACKER (virus writer) Dream (virus)driver-list scanning detecting debuggersdrivers filter filter driver virus deactivation (memory scanning) 2nd 3rd kernel-mode lists ofdroppers definition of 2nd Dukakis (virus) 2nd Dumaru (worm) 2nddumps PEDUMP strings 2nd Dustbin Dwarf (Core War warrior program) 2nd dynamic analysis techniques 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th dynamic decryptor detection 2nd dynamic heuristics dynamic link library viruses 2nd 3rddynamically allocated memory [See heaps] |