Malware engineering
dc.contributor.author | Katzenbeisser, S. | |
dc.contributor.author | Schallhart, C. | |
dc.contributor.author | Veith, H. | |
dc.contributor.editor | Federrath, Hannes | |
dc.date.accessioned | 2019-10-11T09:27:54Z | |
dc.date.available | 2019-10-11T09:27:54Z | |
dc.date.issued | 2005 | |
dc.description.abstract | Starting from simple hand-crafted viruses, today's malware has evolved to constitute highly infectious computer diseases. The technical development of malware was mainly driven by the wish to improve and accelerate both attacks and proliferation. Although these programs have incurred significant hazard and financial losses, their mechanisms are relatively simple and are amenable to effective countermeasuresonce, the first attack has been launched. From a software technology point of view, malicious software in fact is often very similar to network services with the main difference that security holes are exploited to enforce participation in the protocol. In this position paper we outline the wide range of possible malware-specific engineering techniques which are not used in known viruses and worms, but are technically feasible and will therefore be realized in the foreseeable future-less likely by hackers than by organized illegal entities. The techniques we describe enable the malware to obfuscate its functionality, monitor and analyze its environment, and modify or extend itself in non-trivial ways. Consequently, future security policies and risk assessments have to account for these new classes of malware. WE ARE THEIR FOOD. THOSE GERMS OF THE PAST THAT BEST CONVERTED OUR BODIES INTO THEIR OWN PROPAGATION ARE THE GERMS OF THE PRESENT. THOSE GERMS OF THE PRESENT THAT BEST CONVERT OUR BODIES INTO THEIR OWN PROPAGATION ARE THE GERMS OF THE FUTURE. Paul W. Ewald [Ewa00] | en |
dc.identifier.isbn | 3-88579-391-1 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/28365 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | Sicherheit 2005, Sicherheit – Schutz und Zuverlässigkeit | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-62 | |
dc.title | Malware engineering | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 148 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 139 | |
gi.conference.date | 5.-8. April 2005 | |
gi.conference.location | Regensburg | |
gi.conference.sessiontitle | Regular Research Papers |
Dateien
Originalbündel
1 - 1 von 1
Lade...
- Name:
- GI-Proceedings.62-13.pdf
- Größe:
- 263.58 KB
- Format:
- Adobe Portable Document Format