Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] Ma, Albert MAC (mandatory access control)MAC OS X shell scripts Machine field (PE header)Macintosh platform resource-dependent viruses 2nd Macro Identification and Resemblance Analyzer (MIRA) macro viruses 2nd 3rd 4th 5th 6th corruption 2nd evolution and devolution 2nd formula macros 2nd in Lotus Word Pro 2nd infecting user macros language dependency 2nd Lotus 1-2-3 2nd multipartite infection strategy 2nd naming conventions platform dependency 2nd source code, p-code, execode 2nd up-conversion and down-conversion 2nd XML 2ndmacros integrity checking Magic field (PE header)Magistr (worm) SMTP-based attacksmailers definition of naming conventionsmaintenance virus collection 2nd malicious code analysis techniques architecture guides collection maintenance 2nd dedicated system installation 2nd Digital Immune System 2nd 3rd disassemblers 2nd 3rd 4th 5th dynamic analysis techniques 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th knowledge bases 2nd process of 2nd 3rd 4th 5th 6th 7th 8th unpacking 2nd Virus Analysis Toolkit (VAT) 2nd VMWARE 2ndmalicious programs [See computer viruses] malloc() functionmalware [See computer viruses]management memory 2nd Virtual Memory Manager mandatory access control (MAC) MapInfo viruses 2nd MARS (Memory Array Redcode Simulator) Martin, Edwin Marx, Andreasmass-mailer worms (@mm worms) definition ofmass-mailers naming conventions Master Boot Record (MBR) master boot record (MBR) infection techniques 2nd 3rdmatching patterns mathematical model for computer viruses MBR (Master Boot Record) MBR (master boot record) infection techniques 2nd 3rd McAfee SCAN (antivirus program) MCB (memory control block) 2nd MDEF virusesMemorial [See W95/Memorial (virus)]memorybuffer overflow attacks [See buffer overflow attacks] dirty memory pagesdynamically allocated memory [See heaps] management read-only kernelvideo memory checking VMM memory area Memory Array Redcode Simulator (MARS) memory control block (MCB) 2ndMemory Manager paging 2nd 3rdmemory residency strategies direct-action viruses 2nd in-memory injectors over networks kernel mode, viruses in 2nd 3rd 4th 5th memory-resident viruses 2nd disk cache and system buffer viruses 2nd 3rd installation under DOS 2nd 3rd interrupt hooking 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th self-detection techniques 2nd stealth viruses 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th processes, viruses in 2nd swapping viruses 2nd temporary memory-resident viruses 2nd memory scanning 2nd attacks 2nd detecting debuggers disinfection 2nd loaded DLLs patching code in active pages 2nd process termination thread termination 2nd 3rd 4th for interrupt handler 2nd in kernel mode 64-bit platforms 2nd 3rd classes of context 2nd filter driver virus deactivation 2nd 3rd read-only memory upper 2G of address space user address space of processes Windows NT functions 2nd Windows NT service API entry points 2nd in user mode 2nd 3rd executed images (Win32 viruses) 2nd 3rd hidden window procedure (Win32 viruses) native Windows NT service viruses NtQuerySystemInformation() (NtQSI) 2nd 3rd processes/rights 2nd Win32 viruses 2nd 3rd 4th paging 2nd 3rd Windows NT virtual memory system 2nd 3rd 4th address spaces 2nd 3rd 4th 5th 6th 7th memory-resident viruses 2nd disk cache and system buffer viruses 2nd 3rd installation under DOS 2nd 3rd interrupt hooking 2nd 3rd 4th 5th on INT 13h (boot viruses) 2nd 3rd on INT 21h (file viruses) 2nd 3rd 4th self-detection techniques 2nd stealth viruses 2nd cluster and sector-level stealth viruses 2nd 3rd full-stealth viruses 2nd hardware-level stealth viruses 2nd 3rd read stealth viruses 2nd 3rd 4th 5th semistealth viruses 2nd 3rd 4th Mental Driller (virus writer) Simile.D virus W32/Simile virus Merkle, Ralph C Merry Xmas (virus)Metal Driller (virus writer) W95/Drill virus metamorphic virus detection code emulation 2nd 3rd 4th 5th disassembling techniques 2nd geometric detection 2nd metamorphic viruses 2nd 3rd 4th complex permutation techniques 2nd 3rd 4th 5th host application mutation 2nd MSIL metamorphic viruses 2nd simple permutation techniques 2nd 3rd 4th W32/Simile virus 2nd 3rd 4th 5th 6th 7th 8th 9th W95/Zmist virus 2nd 3rd 4th 5th metamorphic worms 2nd MetaPHOR (virus engine) MICE (Core War warrior program) Michelangelo (virus)Microsoft .NET [See .NET]Microsoft IIS servers W32/Nimda.A@mm worm 2nd Microsoft Security Bulletin MS03-007Microsoft SQL Server 2000 W32/Slammer wormMicrosoft SQL Serversexploits blocking 2nd 3rd Microsoft Visual .NET 2003 (7.0 & 7.1) 2nd 3rd 4thMicrosoft Xbox security vulnerabilities MIME types 2nd W32/Badtrans.B@mm worm 2nd W32/Nimda.A@mm worm 2nd MIRA (Macro Identification and Resemblance Analyzer)mIRC instant messaging viruses 2ndmismatches first-generation antivirus scanners Mistfall enginemitigation return-to-LIBC attacks 2nd 3rd 4thmixed techniques [See blended attacks] MMX instructions 2ndmobile phones worms on 2nd 3rd modeling virus infections 2nd mathematical modelmodeskernel 64-bit platform memory scanning 2nd 3rd classes of context (memory scanning) 2nd filter driver virus deactivation (memory scanning) 2nd 3rd memory scanning in read-only memory upper 2G of address space (memory scanning) user address space of processes Windows NT functions (memory scanning) 2nd Windows NT service API entry points (memory scanning) 2ndmodification to files (tracking) 2ndmodules altering loggingMole virus [See W32/IKX (virus)]monitoring files 2nd malicious code 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th ports processes registries threads Monxla (virus) Morris (worm) 2nd 3rd 4th avoiding buffer overflow attacks blocking buffer overflow attacks copycat Linux/ADM worm 2nd detailed description of 2nd 3rd 4th history of blended attacks 2nd shellcode blocking weak passwords Morris Internet wormMorris, Robert, Sr Core WarMosquitos game logic bomb in MPB/Kynel (virus) Mr. Sandman (virus writer) Anti-AVP virus MSAV (antivirus program) MSIL metamorphic viruses 2nd MSIL/Gastropod (virus) self-protection technique 2nd 3rd MSIL/Impanate (virus) self-protection technique MtE (mutation engine) 2nd 3rd MtE (Mutation Engine)MtE mutation engine static decryptor detectionmultipartite infection strategy macro viruses 2nd multipartite viruses 2nd multiple PE headers multiple virus sections 2nd multiple-fork support (NTFS) multithreaded viruses Murkry (virus writer) 2ndMurkry (virus) infection techniquemutation [See corruption] mutation engine (MtE) 2nd Mutation Engine (MtE) mutation engine (MtE) Muttik, Igor 2nd metamorphic virusesMX queries and SMTP-based worm attacks 2ndMydoom (virus) cooperation with wormsMydoom (worm) SMTP-based attacks with MX queriesMyname [See OS2/Myname (virus)] |