Malware
Terms and concepts you should know
Paul Krzyzanowski
March 29, 2024
- Malware
- Worm
- Virus
- Spyware
- Backdoor
- Ransomware
- Exfiltration
- Logic Bomb
- Dropper
- Keylogger
- Windows Hooks
- Zero-day Exploit
- File Infector
- USB and infected firmware
- Autorun
- Data leakage
- Macro Viruses
- Social Engineering
- Phishing
- Spear Phishing
- Smishing
- Hiding Malicious URLs
- Honeypots
- Startup Services
- Bootkit
- Trojan Horse
- Overt vs. Covert Porpose
- Rootkit
- Kernel-mode, User-mode, and Hypervisor Rootkits
- Signature-based Detection
- Behavior-based Detection (Heuristic Analysis)
- Signature Scanning
- Virus Defenses
- Encrypted malware
- Packing, packer
- Polymorphic Virus
- Static Heuristic Analysis
- Dynamic Heuristic Analysis
- Sandbox
- Sandboxing through system call Interposition
- Problems with Janus Sandboxing
- TOCTTOU
- Kernel-based Sandoxing
- seccomp-BPF
- Browser-based sandboxing
- NaCl static analysis
- Inner and Outer Sandbox
- Java sandboxing
- Java Bytecode Verifier
- Java Class Loader
- Java Security Manager