Lecture 26 Outline

Reading: §23
Due: Lab 4, due on June 6, 2018 at 11:59pm; Homework 5, due on June 7, 2018 at 11:59pm


  1. Malware, malicious logic
  2. Trojan horse
    1. Rootkits
    2. Propagating Trojan horses
  3. Computer virus
    1. Infection vectors: boot sector, executable, multipartite, macro
    2. Concealment: TSR, stealth, encrypted, polymorphic, metamorphic
  4. Computer worm

UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: mabishop@ucdavis.edu
ECS 153, Computer Security
Version of June 3, 2018 at 9:48PM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh