Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] F-PROT (antivirus program) 2nd 3rd 4thF1 key Help file viruses 2ndfalse positives integrity checking 2nd signaturesFAT file systems cluster viruses 2nd 3rd Father Christmas (worm) Father Christmas worm 2nd FC (File Compare) 2nd Ferenc, Leitold Ferrie, Peter TLSDEMO program File Compare tool file extension dependency 2nd 3rd file format dependency 2nd 3rd 4th 5th 6th 7th 8th 9th 10thfile formats obfuscationfile infection techniques [See infection techniques] File Monitor log file parsing attacks 2nd file stealth viruses 2nd 3rdfile structure infection Win32 file system dependency 2nd 3rd 4thfile systems filter driversfile viruses generic disinfection methods 2nd hooking INT 21h (interrupt handler) 2nd 3rd 4th FileAlignment field (PE header)files goat (natural infection testing) 2nd IDA command script (IDC)images scanning monitoring 2nd Filler (virus) 2nd infection technique filter driver virus deactivation (memory scanning) 2nd 3rdfiltering algorithmic scanning methods 2nd 3rd as process of computer virus analysis 2ndfilters driversfingerd program Morris worm attack againstfingerprinting worm targets 2nd 3rd 4th 5th 6th Finnpoly (virus) firewalls 2nd 3rd 4th BlackIce first-generation antivirus scanners bookmarks 2nd entry-point scanning 2nd fixed-point scanning 2nd generic detection hashing 2nd hyperfast disk access mismatches string scanning 2nd 3rd top-and-tail scanning wildcards 2nd first-generation buffer overflows 2nd 3rd 4th definition of first-generation Windows 95 viruses 2nd 3rd FitzGerald, Nickfixed-point scanning first-generation antivirus scanners 2ndflags suspicious combinations ofFlash ActionScript viruses 2nd Flash BIOS viruses 2ndFlip (virus) somewhat destructive payload viruses flirt signaturesflooders definition of FluShot (antivirus program) Ford, RichardForm (virus) infection technique format specifiers format string attacks 2nd 3rd 4th 5th 6th 7th 8th 9th 10thformatting extra sectors 2nd 3rd formula macros 2nd FPU instructions 2nd fractionated cavity viruses (infection technique) 2nd 3rd 4th 5thFranvir [See W32/Franvir (virus)]Fredkin, Edward self-replicating structures 2nd 3rd free() functionFreeBSD/Scalper (worm) shellcode blocking Freitas, Robert A., JrFrodo (virus) hook table 2nd interrupt hooking 2nd 3rd self-protection technique full-stealth file viruses full-stealth polymorphic viruses full-stealth viruses 2ndfunction GetProcAddress() function call-hooking (infection technique) 2nd 3rd function pointer overflows 2nd 3rd 4thfunctions direct library invocation detection 2nd 3rd execve() exporting 2nd free() KiUserExceptionDispatcher() LoadLibrary() malloc() NTDLL NtOpenThread() Object Manager OpenThread() run-time library (RTL) VirtualAlloc() VirtualProtectEx()Windows NT for kernel-mode memory scanning 2nd functionsGetProcAddress() future worm attacks 2nd 3rd 4th |