THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources]

Peter Szor

نسخه متنی -صفحه : 191/ 177
نمايش فراداده

  • Index

    [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

    L0phtCrack (password cracking program)

    LADS (tool)

    Langton, Christopher G

    language dependency

    of macro viruses 2nd

    large scale damage due to worms

    layers

    of indirection

    LE (linear executable) file format

    Leapfrog (virus)

    infection technique

    Lehigh (virus)

    infection technique

    Leitold, Ferenc

    Lexotan engine

    lfanew field modification (infection technique) 2nd

    LFM (virus) 2nd

    LIB viruses 2nd 3rd

    libraries

    direct function invocation detection 2nd 3rd

    return-toLIBC attacks 2nd 3rd 4th

    Libsafe (subsystem extension) 2nd

    Life (game) 2nd 3rd 4th 5th 6th

    life-cycle manager

    of worms 2nd 3rd 4th

    linear executable (LE) file format

    linker dependency 2nd

    linking

    DLLs to executables 2nd 3rd 4th

    links

    to Web sites or proxies 2nd 3rd

    Linux

    ELF viruses

    Linux/ADM (worm)

    detailed description of 2nd

    shellcode blocking

    Linux/Cheese (worm)

    Linux/Jac.8759 (virus)

    Linux/Lion (antiworm)

    Linux/Peelf (virus)

    Linux/Simile (virus) [See metamorphic viruses;W32/Simile virus]

    Linux/Simile.D (virus)

    self-protection technique

    Linux/Slapper (virus) 2nd

    Linux/Slapper (worm) 2nd 3rd

    blocking buffer overflow attacks 2nd

    capturing 2nd 3rd

    detailed description of 2nd 3rd 4th 5th 6th 7th 8th

    DoS attack

    e-mail address harvesting

    GOT and IAT page attributes

    heap overflows

    peer-to-peer network control 2nd 3rd 4th

    predefined class table for network scanning 2nd 3rd 4th

    shell code-based attacks

    shellcode blocking

    worm blocking techniques

    Linux/Slapper attack

    listings

    1260 virus decryptor

    16-bit Intel CPU emulator snippet

    ACG sample instance

    Apache Web Server answer to Linux/Slapper GET request

    architectural structure of Linux/Slapper worm

    Babylonia worm's message

    bogus GET request of Linux/Slapper worm

    bogus program subject to code injection attacks

    bogus program with incorrect formatting syntax

    buggy C code

    Cascade virus decryptor

    class definitions of Linux/Slapper worm

    CodeGreen GET request

    CodeGreen worm messages

    Coke's polymorphic macro 2nd

    Core Wars instructions (1994 revision)

    corrupted macro example

    decoding security cookies

    DOS COM infector virus

    Dwarf bombing warrior program

    Dwarf's code when first bomb is dropped

    first-generation Win32 heuristics

    format string application

    function imports

    function pointer application example

    heap overflow example

    hiding CALL-to-POP trick

    hook routine entry of Frodo

    Hybris update in alt.comp.virus

    IAT hooking

    interrupt hooking by Stoned virus

    JMP instruction to Frodo's hook routine

    kernel and loaded driver map on 64-bit Windows on IA64

    loaded drivers and base addresses in 32-bit address space

    MSIL/Gastropod virus generations

    MtE-generated decryptor

    NtOpenThread() API definition

    obfuscated code

    obfuscated trick of Whale

    parameters of send() function

    potential overflow condition

    randomized IP address builder routine of Linux/Slapper worm

    Ring 0

    Scriptlet.Typelib to write into a file

    section modification of W95/Anxiety.1358

    section table of CALC.EXE

    service call on NT on IA32

    service call on Pentium II processors

    setting security cookies

    shellcode of Morris worm

    single-stepping, detecting using stack state

    SMEG.Quueq virus, decrypted

    SMEG.Quueq virus, encrypted

    source infector virus

    standard security handler

    Stoned.A virus map

    Stoned.B virus map

    system executables and DLLs

    system service call on IA64

    typical host's configuration file

    vulnerable program (heap overflows)

    W32/Cabanas virus at end of user address space

    W32/CodeRed variants and threads

    W32/Evol virus generations

    W32/Heretic.1986.A at end of infected KERNEL32.DLL in memory

    W32/Heretic.1986.A modifies export address of CreateProcess APIs

    W32/Niko.5178 virus creates two threads

    W32/Niko.5178 virus in infected ASD.EXE application

    W32/Parvo inside NOTEPAD's address space

    W32/Parvo runs original NOTEPAD.EXE as JRWK.EXE

    W95/Fabi virus emulation

    W95/Fabi.9608 virus, decrypted

    W95/Fabi.9608 virus, encrypted

    W95/Mad virus decrypted snippet

    W95/Mad virus encrypted snippet

    W95/Mad.2736 virus decryptor

    W95/Marburg virus decryptor instance

    W95/Memorial virus decryptor 2nd

    W95/Puron virus detection

    W95/Regswap generations

    WNT/RemEx running as ie403r.sys service

    X-RAY of SMEG viruses

    Zeppelin virus, generic disinfection

    Liston, Tom

    lists

    router access 2nd 3rd

    Litchfield, David 2nd

    LMF (lunar manufacturing facility)

    LNK viruses 2nd

    loaded DLLs, disinfecting

    LoadLibrary() function

    logging

    module

    logic bombs

    definition of 2nd

    Logic worm 2nd 3rd 4th

    Logo language

    Super Logo viruses 2nd 3rd 4th

    logs

    File Monitor

    long loops

    Lorez [See W95/Lorez (virus)]

    Lotus 1-2-3 macro viruses 2nd

    Lotus Word Pro viruses 2nd

    LoveLetter [See VBS/LoveLetter.A@mm (worm)]

    low-interaction honeypot systems

    Lucifer (virus)

    infection technique

    Ludwig, Mark

    lunar manufacturing facility (LMF)

    LWP/Spenty (virus)

    LX viruses 2nd