Index[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Y]
[Z]
e-mail executable code-based attacks HTML-based mail e-mail address harvesting (worms) 2nd 3rd 4th 5th 6th 7th e-mail addresses parsing files for e-mail attachment inserters worm infections e-mail attacks worm infections 2nd early warning systems early warnings information on Easter eggs definition of ecophagy Eddie (virus) self-protection technique Eddie-2 (virus) EICAR (European Institute for Computer Antivirus Research) ELF viruses 2nd Elk Cloner (virus) 2nd 3rd EMACS viruses embedded decryptor (infection technique) 2nd 3rd embedded decryptor and virus body (infection technique) 2nd 3rd embedded object insertion dependency 2nd emulation
[See code emulation] antiemulation techniques (armored viruses) 2nd 3rd 4th 5th 6th encoding URLs 2nd encrypted viruses 2nd 3rd 4th 5th 6th 7th 8th 9th encryption 2nd 3rd 4th 5th 6th 7th 8th [See also decryption] Linux/Slapper worm of host file headers 2nd virus detection 2nd 3rd 4th 5th W95/Marburg virus X-RAY algorithmic scanning method 2nd 3rd 4th 5th entry point-obscuring polymorphic viruses entry points obfuscation random entry points in code section 2nd entry-point obscuring technique 2nd entry-point obscuring viruses (infection technique) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th entry-point scanning first-generation antivirus scanners 2nd enumeration network enumeration attacks 2nd 3rd of network shares 2nd 3rd processes environments of malicious code 2nd 3rd archive format dependency 2nd compiler and linker dependency 2nd computer architecture dependency 2nd CPU dependency 2nd date and time dependency 2nd debugger dependency 2nd 3rd device translator layer dependency 2nd 3rd 4th 5th embedded object insertion dependency 2nd extension dependency 2nd 3rd file format dependency 2nd 3rd 4th 5th 6th 7th 8th 9th 10th file system dependency 2nd 3rd 4th host size dependency 2nd interpreted environment dependency 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th JIT dependency 2nd 3rd multipartite viruses 2nd network protocol dependency operating system dependency 2nd operating system version dependency 2nd resource dependency 2nd self-contained environment dependency 2nd 3rd 4th source code dependency 2nd vulnerability dependency EPO (entry-point obscuring) viruses (infection technique) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th EPO mechanism W32/Simile virus EPO viruses error detection and correction with Hamming code 2nd ESC sequences reconfiguring 2nd Etap.D (virus) 2nd ETG (executable trash generator) engine Ethereal Linux/Slapper (worm) W32/Aliz@mm (worm) captures W32/Blaster worms W32/Sasser.D (worm) ethics of using virus construction kits Etoh, Hiroaki European Institute for Computer Antivirus Research (EICAR) Evol (virus) code emulation evolution of macro viruses 2nd evolution of virus code 2nd exact identification 2nd 3rd Excel viruses
[See macro viruses] exception handlers exception handling CodeRed worm 2nd exception-handler validation 2nd 3rd 4th exceptions generating structured exception handling 2nd EXE viruses 2nd Exebug (virus) execode macro viruses 2nd executable code-based attacks executable trash generator (ETG) engine executables linking DLLs to 2nd 3rd 4th executed images (Win32 viruses) 2nd 3rd ExecuteOnly attribute (Novell NetWare) attacks via 2nd 3rd 4th 5th execution random execution logic 2nd execution environments
[See environments of malicious code] execve() function exploits
[See blended attacks] [See vulnerability dependency] automated discovery 2nd definition of exploits W32/Slammer (worm) 2nd 3rd export table (PE files) 2nd exporting functions 2nd extended access lists Extended Memory Specification (XMS) extended tiny encryption algorithm (XTEA) extension dependency 2nd 3rd extensions kernel-mode 2nd subsystems 2nd extra disk sectors formatting 2nd 3rd |