Lecture 16: Anti-Malware Programs
Date
: October 25, 2013
Homework due
: Nov. 1 at 5:00pm
Midterm
: Nov. 4
in class
Midterm: questions, review
Review of types of malware
Trojan horses
Computer viruses
Stealth
Encrypted
Polymorphic
Metamorphic
Computer worms
Bacteria, rabbits
Signature detection
What a signature is: hash, patterns
How to look for it
When to look for it: at boot time, on file open, at execution
Scanning disks
Behavioral analysis
Execute in contained environment
Simulate execution
You can also obtain a PDF version of this.
Version of November 5, 2013 at 7:49PM