Index[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Y]
[Z]
DAC (discretionary access control systems) Dark Angel (virus writer) PS-MPC virus construction kit Dark Avenger (virus writer) Commander_Bomber virus 2nd 3rd MtE (mutation engine) 2nd 3rd Number_Of_The_Beast virus Dark Avenger (virus) self-protection technique Dark_Avenger (virus) Dark_Avenger.1800.A (virus) self-protection technique Darkman (virus writer) W2K/Installer virus Darkness (virus) DarkParanoid (virus) memory scanning attacks Darth_Vader (virus) infection technique system buffer viruses Darwin (game) data versus code in von Neumann machines data diddler viruses 2nd Data Fellows Data Rescue's IDA
[See IDA (disassembler)] data stealing viruses 2nd 3rd 4th 5th date and time dependency 2nd DBR (DOS BOOT record) infection techniques 2nd 3rd DCL viruses 2nd DDoS (distributed denial of service) attacks de Wit, Jan deactivation of filter driver viruses 2nd 3rd dead virus code reviving DEBUG command DEBUG command (sendmail) Morris worm debug interfaces tracing with 2nd debug registers clearing debugger dependency 2nd 3rd debuggers antidebugging techniques (armored viruses) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th debugging 2nd 3rd 4th 5th DEC/VMS systems DCL viruses 2nd deception e-mail worm attacks 2nd decoders packets decryption [See also encryption] backward decryption disassemblers 2nd 3rd 4th 5th nonlinear decryption RDA viruses with stack pointer (SP) decryptors dynamic detection 2nd generic 2nd static detection 2nd 3rd tracking dedicated virus analysis systems installation of 2nd VMWARE 2nd DeepSight alerts Demon Emperor (virus writer) Hare virus 2nd Den_Zuko (virus) competition between viruses denial of service (DoS) attacks 2nd 3rd 4th Denzuko (virus) infection technique dependencies archive format dependency 2nd compiler and linker dependency 2nd computer architecture dependency 2nd CPU dependency 2nd date and time dependency 2nd debugger dependency 2nd 3rd device translator layer dependency 2nd 3rd 4th 5th embedded object insertion dependency 2nd extension dependency 2nd 3rd file format dependency 2nd 3rd 4th 5th 6th 7th 8th 9th 10th file system dependency 2nd 3rd 4th host size dependency 2nd interpreted environment dependency 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th JIT dependency 2nd 3rd language dependency of macro viruses 2nd multipartite viruses 2nd network protocol dependency operating system dependency 2nd operating system version dependency 2nd platform dependency of macro viruses 2nd Registry-dependent viruses 2nd resource dependency 2nd self-contained environment dependency 2nd 3rd 4th source code dependency 2nd vulnerability dependency destructive payload viruses highly destructive payloads 2nd 3rd 4th 5th 6th 7th somewhat destructive payloads 2nd 3rd detection active viruses in memory cryptographic direct library function invocations 2nd 3rd dynamic decryptor 2nd engines first-generation antivirus scanners bookmarks 2nd entry-point scanning 2nd fixed-point scanning 2nd generic hashing 2nd hyperfast disk access mismatches string scanning 2nd 3rd top-and-tail scanning wildcards 2nd geometric 2nd injected code shellcode blocking 2nd 3rd 4th 5th 6th 7th 8th network intrusion detection system (NIDS) 2nd network-intrusion detection system (NIDS) second-generation antivirus scanners exact identification 2nd 3rd nearly-exact identification 2nd skeleton smart scanning 2nd static decryptor 2nd 3rd threads 2nd 3rd 4th device driver viruses 2nd device translator layer dependency 2nd 3rd 4th 5th devolution of macro viruses 2nd Dewdney, A.K dialers definition of dictionary attacks Digital Immune System 2nd 3rd Digital Millennium Copyright Act (DMCA) DIR-II (virus) direct library function invocations, detection of 2nd 3rd direct-action viruses 2nd directories page (memory) directory stealth viruses 2nd 3rd 4th dirty memory pages disassemblers antidisassembly techniques (armored viruses) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th malicious code analysis techniques 2nd 3rd 4th 5th disassembling techniques metamorphic virus detection 2nd discovery of automated exploits 2nd discretionary access control systems (DAC) disinfection
[See antivirus programs] memory scanning 2nd loaded DLLs patching code in active pages 2nd process termination thread termination 2nd 3rd 4th disinfection methods 2nd 3rd 4th 5th [See also antivirus programs] generic decryptors 2nd heuristics for generic repair 2nd standard 2nd 3rd disk access with port I/O 2nd disk cache viruses 2nd 3rd Disk Killer (virus) infection technique Dispatch routine of DeactivatorDrivers distributed denial of service (DDoS) attacks divide-by-zero exceptions DLL viruses 2nd 3rd DLLs disinfecting linking to executables 2nd 3rd 4th DMCA (Digital Millennium Copyright Act) Donut (virus) Doomed (game) Doomjuice (worm) cooperation with viruses DOS behavior blocking cluster and sector-level stealth viruses 2nd 3rd COM viruses EPO (entry-point obscuring) viruses 2nd 3rd 4th 5th 6th 7th EXE viruses 2nd full-stealth viruses 2nd interrupt hooking 2nd 3rd 4th 5th on INT 13h (boot viruses) 2nd 3rd on INT 21h (file viruses) 2nd 3rd 4th memory-resident viruses installation 2nd 3rd self-detection techniques 2nd metamorphic viruses server function call system buffer viruses TSR (Terminate-and-Stay-Resident) programs 2nd undocumented interrupt (Int 21h/52h function) DoS (denial of service) attacks 2nd 3rd 4th DoS attacks against Windows Update Web site DOS BOOT record (DBR) infection techniques 2nd 3rd DOS stub in PE header "double extensions" down-conversion of macro viruses 2nd downloaders definition of Doxtor L (virus writer) W32/Idele virus DR. DR. STROBE & PAPA HACKER (virus writer) Dream (virus) driver-list scanning detecting debuggers drivers filter filter driver virus deactivation (memory scanning) 2nd 3rd kernel-mode lists of droppers definition of 2nd Dukakis (virus) 2nd Dumaru (worm) 2nd dumps PEDUMP strings 2nd Dustbin Dwarf (Core War warrior program) 2nd dynamic analysis techniques 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th dynamic decryptor detection 2nd dynamic heuristics dynamic link library viruses 2nd 3rd dynamically allocated memory
[See heaps] |