Logo des Repositoriums
 

Malware engineering

dc.contributor.authorKatzenbeisser, S.
dc.contributor.authorSchallhart, C.
dc.contributor.authorVeith, H.
dc.contributor.editorFederrath, Hannes
dc.date.accessioned2019-10-11T09:27:54Z
dc.date.available2019-10-11T09:27:54Z
dc.date.issued2005
dc.description.abstractStarting from simple hand-crafted viruses, today's malware has evolved to constitute highly infectious computer diseases. The technical development of malware was mainly driven by the wish to improve and accelerate both attacks and proliferation. Although these programs have incurred significant hazard and financial losses, their mechanisms are relatively simple and are amenable to effective countermeasuresonce, the first attack has been launched. From a software technology point of view, malicious software in fact is often very similar to network services with the main difference that security holes are exploited to enforce participation in the protocol. In this position paper we outline the wide range of possible malware-specific engineering techniques which are not used in known viruses and worms, but are technically feasible and will therefore be realized in the foreseeable future-less likely by hackers than by organized illegal entities. The techniques we describe enable the malware to obfuscate its functionality, monitor and analyze its environment, and modify or extend itself in non-trivial ways. Consequently, future security policies and risk assessments have to account for these new classes of malware. WE ARE THEIR FOOD. THOSE GERMS OF THE PAST THAT BEST CONVERTED OUR BODIES INTO THEIR OWN PROPAGATION ARE THE GERMS OF THE PRESENT. THOSE GERMS OF THE PRESENT THAT BEST CONVERT OUR BODIES INTO THEIR OWN PROPAGATION ARE THE GERMS OF THE FUTURE. Paul W. Ewald [Ewa00]en
dc.identifier.isbn3-88579-391-1
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/28365
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofSicherheit 2005, Sicherheit – Schutz und Zuverlässigkeit
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-62
dc.titleMalware engineeringen
dc.typeText/Conference Paper
gi.citation.endPage148
gi.citation.publisherPlaceBonn
gi.citation.startPage139
gi.conference.date5.-8. April 2005
gi.conference.locationRegensburg
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
GI-Proceedings.62-13.pdf
Größe:
263.58 KB
Format:
Adobe Portable Document Format