Lecture 26 Outline
Reading
: §23
Due
: Lab 4, due on June 6, 2018 at 11:59pm; Homework 5, due on June 7, 2018 at 11:59pm
Malware, malicious logic
Trojan horse
Rootkits
Propagating Trojan horses
Computer virus
Infection vectors: boot sector, executable, multipartite, macro
Concealment: TSR, stealth, encrypted, polymorphic, metamorphic
Computer worm
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email:
mabishop@ucdavis.edu
ECS 153, Computer Security
Version of June 3, 2018 at 9:48PM
You can also obtain a PDF version of this.