A Pathology of Computer Viruses by David Ferbrache BSc(Hons) (auth.)

By David Ferbrache BSc(Hons) (auth.)

The 1980's observed the arrival of frequent (and most likely harmful) trojan horse an infection of either laptop and mainframe platforms. the pc defense box has been relatively sluggish to react to this rising state of affairs. it is just during the last years major physique of information at the operation, most probably evolution and prevention of laptop viruses has built. A Pathology of computing device Viruses supplies a close evaluate of the heritage of the pc virus and an in-depth technical overview of the foundations of trojan horse and computer virus operation below DOS, Mac, UNIX and DEC working platforms. David Ferbrache considers the potential extension of the hazard to the mainframe platforms surroundings and indicates how the hazard could be successfully combatted utilizing an antiviral administration plan. the writer addresses the newest advancements in "stealth" virus operations, particularly the fashion for virus authors to undertake huge camouflage and concealment concepts, which enable viruses to stay away from either latest anti-viral software program and to prevent detection through direct commentary of computing device behaviour. A Pathology of machine Viruses addresses a different desire - that of the pc professional who wishes a resource reference paintings detailing all elements of the pc virus threat.

Show description

Read Online or Download A Pathology of Computer Viruses PDF

Best security & encryption books

Error control coding: from theory to practice

This creation to easy coding ideas makes use of examples to give an explanation for primary ideas and their functions. complicated arithmetic are saved to a minimal. Drawing from electronic communications and knowledge thought, the ebook emphasizes the choice of applicable codes and the layout of decoders. Chapters conceal convolution codes, linear block codes, cyclic codes, finite box mathematics, BCH codes, Reed Solomon codes, functionality calculations for block codes, multistage coding, and iterative coding.

Swanson on Internal Auditing Raising the Bar

This publication presents concise observation on strategic matters concerning the means inner audit is validated, deliberate and played. High-level matters sit down along sensible tips to make sure the publication has an entice all degrees of inner audit administration and employees, as each one reader can dip right into a variety of significant themes.

Multimedia Content Encryption: Techniques and Applications

The common use of photograph, audio, and video info makes media content material safeguard more and more important and pressing. for max defense, it's not adequate to simply keep watch over entry rights. for you to absolutely guard multimedia info from piracy or unauthorized use, it needs to be secured via encryption sooner than its transmission or distribution.

Smart TV Security: Media Playback and Digital Video Broadcast

This e-book discusses the rising subject of shrewdpermanent television protection, together with its implications on customer privateness. the writer provides chapters at the structure and performance of shrewdpermanent TVs, quite a few assaults and defenses, and linked hazards for shoppers. This comprises the newest assaults on broadcast-related electronic providers and integrated media playback, in addition to entry to built-in cameras and microphones.

Additional resources for A Pathology of Computer Viruses

Example text

It is sufficient to attack any element in the compilation sequence. A trojan can be inserted in the assembler which recognises assembly of a new assembler, in the linker which recognises linking of a new linker, etc. At lower levels the complexity of correctly adding code to support the trojan increases, due to the loss of information and structure during the compilation. Theoretically the concept could even be extended to an operating system which recognised when an attempt was being made to write a file containing the executable for the next release of the operating system, and to insert a similar trojan into the file.

In the shell 32 A Pathology of Computer Viruses case the host program forms a sub routine of the virus. The virus is thus executed before and after host program execution. Depending on the complexity of the object code file structure it may be difficult or impossible to arrange for the execution of viral code after the host program has terminated. In general this is due to the multiplicity of exit or return instructions in a subroutine or pragram. The appending virus must therefore patch the original host so that contral passes to the virus first (this is normally achieved by modifying a few instructions at the start of the host).

The "licence" document accompanying the trojan program contained: 1. Introduction. 2. Instructions for installation. 3. Limited warrant)' stating that in the event of the program being defective PC Cyborg (the alleged manufacturer) would replace it at no charge. This was followed by a standard disclaimer indicating that the programs are supplied "as is", without warranty of any form. 4. Licence agreement stating the conditions under which PC Cyborg would renew the licence beyond the initial trial period, and noting that in the event of a breach of licence PC Cyborg would be permitted to use "program mechanisms to ensure termination of your use of the programs" .

Download PDF sample

Rated 4.77 of 5 – based on 9 votes