Outline for May 29, 2003
- Security testing
- Property-based testing
- What is malicious logic?
- Trojan horses
- Propagating Trojan horses
- Computer viruses
- Boot sector infectors
- Executable infectors
- Multipartitie infectors
- TSR viruses
- Stealtth viruses
- Encrypted viruses
- Polymorphic viruses
- Macro viruses
- Computer worms
- Original work
- Internet worm
- Rabbits and Logic Bombs
- Countermeasures
- Separate data and instructions
- Limit protection domain: flow control, reduction of rights
- Karger's knowledge-based subsystem
- Sandboxing
- Limit sharing
- Detect alteration of files
- Specification-based behavior
- Proof-carrying code
- Statistical analysis
This is available in Postscript
and PDF.