Index[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Y]
[Z]
Cabanas
[See W32/Cabanas (virus)] cache bypass vulnerability W32/Blebla worm cache viruses
[See disk cache viruses] calc.exe CALL-to-POP trick 2nd calls system tracing 2nd canonicalization 2nd captures Linux/Slapper (worm) 2nd 3rd network traffic W32/Blaster (worm) 2nd W32/Sasser.D (worm) W32/Slammer (worm) 2nd 3rd W32/Welchia (worm) CARO (Computer Antivirus Researchers Organization) Cascade (virus) 2nd 3rd 4th nondestructive payload viruses self-protection technique 2nd X-RAY scanning cavity viruses (infection technique) 2nd 3rd CBAC (context-based access control) CC hack CEF file format 2nd cell phones worms on 2nd 3rd cellular automata [See also self-replicating systems] Edward Fredkin structures 2nd 3rd game of Life (Conway) 2nd 3rd 4th 5th 6th cellular automata (CA) computer architecture chain letters definition of 2nd changed objects integrity checking Characteristics field (PE header) check bytes
[See bookmarks] checksum API strings as self-protection technique 2nd CRC checksum detecting break points 2nd recalculation 2nd Checksum field (PE header) Cheeba (virus) self-protection technique Cheese (worm Chess, Dave 2nd Cheswick, Bill Chi, Darren CHRISTMA EXEC worm 2nd Cisco routers [See also routers] classic parasitic viruses (infection technique) 2nd 3rd clean initial states integrity checking cleaning goat files Clementi, Andreas cluster prepender infection method cluster viruses file system dependency 2nd 3rd cluster-level stealth viruses 2nd 3rd CMOS viruses Codd, E.F code in active pages patching 2nd injected code detection shellcode blocking 2nd 3rd 4th 5th 6th 7th 8th malicious code analysis techniques architecture guides collection maintenance 2nd dedicated system installation 2nd Digital Immune System 2nd 3rd disassemblers 2nd 3rd 4th 5th dynamic analysis techniques 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th knowledge bases 2nd process of 2nd 3rd 4th 5th 6th 7th 8th unpacking 2nd Virus Analysis Toolkit (VAT) 2nd VMWARE 2nd quick examination of as process of computer virus analysis self-sending code blocking 2nd 3rd 4th 5th versus data in von Neumann machines code builders (infection technique) 2nd 3rd code confusion
[See obfuscated code] code emulation 2nd 3rd 4th dynamic decryptor detection 2nd encrypted/polymorphic virus detection 2nd 3rd 4th 5th metamorphic virus detection 2nd 3rd 4th 5th code emulation-based tunneling code evolution 2nd code injection attacks 2nd 3rd 4th CodeRed worm 2nd 3rd 4th code integration W95/Zmist virus 2nd code integration viruses (infection technique) 2nd 3rd code propagation techniques (worms) code injection attacks 2nd 3rd executable code-based attacks HTML-based mail links to Web sites or proxies 2nd 3rd remote login-based attacks 2nd shell code-based attacks 2nd 3rd 4th 5th code redirection code reviews buffer overflow attacks (worms) code section random entry point 2nd code sections naming packing 2nd PE entry points sizes in header writeable flag CodeGreen (worm) competition between worms 2nd CodeRed (virus) CodeRed (worm) 2nd avoiding buffer overflow attacks competition between worms 2nd computer security versus antivirus programs detailed description of 2nd 3rd 4th history of blended attacks stack buffer overflows system modification attacks CodeRed_II (worm) Cohen, Fred Cohen, Frederic 2nd 3rd Cohen, Frederick definition of computer viruses 2nd history of antivirus programs Coke
[See W32/Coke (virus)] collection (viruses) maintenance 2nd COM viruses combined attacks
[See blended attacks] Commander_Bomber (virus) infection technique 2nd 3rd companion viruses companion viruses (infection technique) competition between viruses 2nd 3rd compiler alignment areas recycling compiler dependency 2nd compiler-level solutions buffer overflow attacks (worms) 2nd Microsoft Visual .NET 2003 (7.0 & 7.1) 2nd 3rd 4th ProPolice 2nd 3rd StackGuard 2nd 3rd 4th compressing viruses (infection technique) 2nd 3rd compression as self-protection technique 2nd 3rd 4th PE file-infection techniques 2nd compression viruses file system dependency Computer Antivirus Researchers Organization (CARO) computer architecture dependency 2nd computer security companies versus antivirus programs 2nd computer simulations of nature
[See nature-simulation games] computer virus analysis, process of 2nd 3rd 4th 5th 6th 7th 8th computer virus research art versus science author's start in 2nd 3rd common patterns 2nd computer viruses code evolution 2nd definition of 2nd 3rd history of 2nd 3rd infection techniques
[See infection techniques] interactions competition 2nd 3rd cooperation 2nd 3rd sexual reproduction SWCP (simple worm communication protocol) modeling virus infections 2nd naming conventions 2nd !*vendor-specific_comment& #*packer& *family_name& 2nd *infective_length& *malware_type&:// *modifiers& *platform&/ 2nd 3rd 4th 5th 6th *variant& .*group_name& :*locale_specifier& @m @mm [*devolution&] retro viruses terminology 2nd 3rd 4th 5th 6th versus worms computer worms
[See worms] computers modeling virus infections 2nd connections [See also network-level defense strategies] worm blocking techniques 2nd construction kits
[See virus construction kits] contagion worms context-based access control (CBAC) control transfer with APIs 2nd Conway, John Horton game of Life 2nd 3rd 4th 5th 6th cookies security_cookie values cooperation between viruses 2nd 3rd coprocessor instructions 2nd copy-protection software extra disk sectors copycat worms [See also worm blocking techniques] Core War (game) 2nd 3rd 4th Core Wars Core Wars instructures (1994 revision) Corel Script viruses 2nd corruption of macro viruses 2nd counterattacks CPU dependency 2nd CPU instructions undocumented CPUs Win32 platform support CR0 control registers CRC checksums CreateFile() API 2nd CreateProcess() API Creeper (virus) cross-platform binary viruses Cruncher (virus) infection technique Crypto API cryptographic detection cryptography AIDS TROJAN DISK Trojan horse Cryptor (virus) self-protection technique Csakany, Antal CSC/CSV (virus) CSC/PVT (virus) |