Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] Sadmind (worm) safe-for-scripting ActiveX controls 2nd VBS/BubbleBoy worm 2nd W32/Blebla worm 2nd sand-boxing 2nd Sandman (virus writer) W95/Haiku virusSAP ABAP virusessavingoriginal boot sector at end of disk 2ndsaving files locally W32/Blebla worm 2nd SC Magazine ITALICscanners algorithmic scanning methods 2nd 3rd filtering 2nd 3rd static decryptor detection 2nd 3rd X-RAY method 2nd 3rd 4th 5th behavior blocking 2nd 3rd 4th code emulation 2nd 3rd 4th dynamic decryptor detection 2nd encrypted/polymorphic virus detection 2nd 3rd 4th 5th disinfection methods 2nd 3rd 4th generic decryptors 2nd heuristics for generic repair 2nd standard 2nd 3rd first-generation antivirus bookmarks 2nd entry-point scanning 2nd fixed-point scanning 2nd generic detection hashing 2nd hyperfast disk access mismatches string scanning 2nd 3rd top-and-tail scanning wildcards 2ndheuristic analysis of 32-bit Windows viruses 2nd 3rd 4th 5th 6th using neural networks viruses 2nd 3rd integrity checking 2nd 3rd 4th sand-boxing 2nd second-generation antivirus exact identification 2nd 3rd nearly-exact identification 2nd skeleton detection smart scanning 2ndviruses inoculation 2ndscanning file images IP addresses 2nd 3rd 4th 5th 6th memory 2nd 64-bit platforms (kernel mode) 2nd 3rd attacks 2nd classes of context (kernel mode) 2nd disinfection 2nd executed images (Win32 viruses) 2nd 3rd filter driver virus deactivation 2nd 3rd hidden window procedure (Win32 viruses) in kernel mode in user mode 2nd 3rd loaded DLLs native Windows NT service viruses NtQuerySystemInformation() (NtQSI) 2nd 3rd paging 2nd 3rd patching code in active pages 2nd process termination processes/rights 2nd read-only kernel memory thread termination 2nd 3rd 4th upper 2G of address space user address space of processes (kernel mode) virtual address spaces 2nd 3rd 4th 5th 6th 7th Win32 viruses 2nd 3rd 4th Windows NT functions (kernel mode) 2nd Windows NT service API entry points (kernel mode) 2nd Windows NT virtual memory system 2nd 3rd 4th scanning (antivirus programs) SCANPROC.EXE Schneier, Brucescience versus artscript viruses REXX viruses 2nd 3rdscripts blocking 2nd 3rdsearch engines harvesting e-mail addresses usingsearching VOOGLE second-generation antivirus scanners exact identification 2nd 3rd nearly-exact identification 2nd skeleton detection smart scanning 2nd second-generation buffer overflows 2nd 3rd 4th 5th 6th 7th 8th 9th 10th definition of section table (PE files) 2nd 3rd 4th SectionAlignment field (PE header)sections code section sizes in headercode sections naming gaps between packed code sections 2nd random entry points 2nd renaming shifting slack area infections suspeicious characteristics writeable flag sections (PE files) sector-level stealth viruses 2nd 3rdsectors formatting extra 2nd 3rd marking as BADsecurity information of updates buffer overflow attacks (worms) 2nd 3rdsecurity exploits [See blended attacks] security_cookie valuesseeding definition of SEH (structured exception handling) self-contained environment dependency 2nd 3rd 4thself-detection techniques memory-resident viruses 2ndself-modifying code [See obfuscated code]self-protection techniques (of viruses) armored viruses antidebugging 2nd 3rd 4th 5th 6th 7th 8th 9th 10th antidisassembly 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th antiemulation 2nd 3rd 4th 5th 6th antigoat techniques 2nd antiheuristics 2nd 3rd 4th 5th 6th 7th 8th 9th 10th encrypted viruses 2nd 3rd 4th 5th 6th 7th 8th 9th metamorphic viruses 2nd 3rd complex permutation techniques 2nd 3rd 4th 5th host application mutation 2nd MSIL metamorphic viruses 2nd simple permutation techniques 2nd 3rd 4th W32/Simile virus 2nd 3rd 4th 5th 6th 7th 8th 9th W95/Zmist virus 2nd 3rd 4th 5th oligomorphic viruses 2nd 3rd polymorphic viruses 1260 virus 2nd 32-bit polymorphic viruses 2nd 3rd 4th 5th MtE (mutation engine) 2nd 3rd retroviruses 2nd 3rd tunneling viruses code emulation disk access with port I/O 2nd memory scanning for interrupt handler 2nd tracing with debug interfaces 2nd undocumented functions 2nd virus construction kits 2nd ethics of using GenVir list of 2nd NGVCK 2nd 3rd PS-MPC 2nd VCL (Virus Creation Laboratory) 2nd VCS (Virus Construction Set) 2nd self-replicating loopsself-replicating systems history of Core War 2nd 3rd 4th Edward Fredkin structures 2nd 3rd game of Life (Conway) 2nd 3rd 4th 5th 6th John von Neumann theory 2nd 3rd self-sending code blocking 2nd 3rd 4th 5thself-tracking of worms 2nd semistealth viruses 2nd 3rd 4thsending self-sending code blocking 2nd 3rd 4th 5thsendmail Morris worm server function call service viruses, native Windows NTSETI use by computer worms sexual reproduction of viruses SH/Renepo.A (worm) shape heuristic share-level password vulnerability sharepoints (network enumeration) shell code-based attacks 2nd 3rd 4th 5th shell scripts 2ndshellcode blocking 2nd 3rd 4th 5th 6th 7th 8th shellcode-based worms Shifter (virus) 2nd 3rdshifting sections Shockwave Rider (Brunner) "Shooter" starting structure (game of Life) 2nd 3rd 4th Short Message Service (SMS) Sieben, Na'ndor signatures flirtSimile (virus) self-protection techniqueSimile virus [See W32/Simile (virus)] Simile.D (virus) 2nd simple worm communication protocol (SWCP) Simulated "Metamorphic" Encryption Generator (SMEG)simulations of nature [See nature-simulation games] single-layer classifiers with thresholdssingle-stepping detecting 2ndSircam (worm) e-mail address harvesting SMTP-based attacks SizeOfCode field SizeOfCode field (PE header)SizeOfImage field incorrect information in SizeOfImage field (PE header) skeleton detectionSkrenta, Rich Elk Cloner (virus) Skulason, Fridrik 2nd 3rd slack area infections Slammer (virus) Slapper (worm) slow infectorsSma [See W95/Sma (virus)] smart scanning 2nd SMEG (Simulated "Metamorphic" Encryption Generator) 2nd 3rd SMS (Short Message Service)SMTP blocking 2nd 3rd SMTP (worms)SMTP proxy-based attacks worm infections 2nd 3rdSMTP spam relay use by computer wormsSMTP-based attacks worm infections 2nd 3rd 4th 5th 6thSnakeByte (virus writer) NGVCK (virus construction kit) Perl virusessniffing traffic SoftIce Debugger (antivirus program) SoftICE toolSolaris on SPARC 2nd Solaris/Sadmind (virus) Solaris/Sadmind (worm) Solomon, Alan 2nd 3rd 4th somewhat destructive payload viruses 2nd 3rdsource code macro viruses 2nd source code dependency 2nd source spoofing Sourcer (disassembler)SP (stack pointer) decryption withspammer programs definition of 2nd Spanska (virus writer) 2nd Happy99 worm IDEA virus IDEA virusesSpanska (virus) ***change to Spanska (virus writer)*** self-protection technique 2ndspecial objects integrity checkingspeed integrity checkingspoofing sourcespyware definition of 2ndSQL Server 2000 W32/Slammer wormssnetlib.dll W32/Slammer worm stack buffer overflows 2nd 3rd causes of 2nd CodeRed worm 2nd 3rd 4th exploiting 2nd Linux/ADM worm 2nd Morris worm 2nd 3rd 4th W32/Blaster worm 2nd 3rd 4th W32/Slammer worm 2nd 3rd 4thstack pointer (SP) decryption with stack smashingstack state checking 2nd stack-based overflow attacks, compiler-level solutions StackGuard 2nd 3rd 4thstacks definition of exception-handler validation return-to-LIBC attacks 2nd 3rd 4th standard access lists standard disinfection 2nd 3rd Starship (virus)StarShip (virus) infection technique stateful firewall solutionsstatic decryptor detection algorithmic scanning methods 2nd 3rd static heuristicsstealing data [See data stealing viruses] stealth viruses 2nd cluster and sector-level stealth viruses 2nd 3rd full-stealth viruses 2nd hardware-level stealth viruses 2nd 3rd read stealth viruses 2nd 3rd 4th 5th semistealth viruses 2nd 3rd 4th Stoll, Clifford Stoned (virus) 2nd 3rd accidentally destructive payload viruses bookmarks exact identification 2nd infection technique 2nd interrupt hooking 2nd nearly exact identification string scanning 2nd 3rd stopping break pointsStormbringer (virus writer) Shifter virus Strack, Stefan Strange (virus)stream viruses file system dependency 2ndStrike (virus) infection technique string scanning 2nd 3rdstrings API strings 2nd dumps 2ndmismatches first-generation antivirus scannerswildcards first-generation antivirus scanners 2nd structured exception handling 2nd structured exception handling (SEH)structures self-replicating structures 2nd 3rd Struss, J. (virus construction kit writer) Stupid (virus)submissions worm-blockingsubsystemsextensions buffer overflow attacks (worms) 2ndWin32 viruses 2nd 3rd 4th super fast infectors Super Logo viruses 2nd 3rd 4th Suslikov, Eugene swapping viruses 2nd SWCP (simple worm communication protocol) Symantec Security Response Symboot SymbOS/Cabir (worm) 2nd 3rd sysenter system buffer viruses 2nd 3rd system call tracing 2nd System File Checker feature (Windows 2000/XP)system loader Windows 95 versus Windows NT 2nd 3rd 4th system modification attacks Novell NetWare ExecuteOnly attribute 2nd 3rd 4th 5th W32/Bolzano virus 2ndsystem rights memory scanning 2nd |