180 likes | 330 Views
Malicious Logic. CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 25, 2004. Overview. Trojan Horses Viruses Other Malicious Logic. Trojan Horses. Overt effect: intended Covert effect: unexpected Propagating: creates a copy of itself Example: Unix login.
E N D
Malicious Logic CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 25, 2004
Overview • Trojan Horses • Viruses • Other Malicious Logic
Trojan Horses • Overt effect: intended • Covert effect: unexpected • Propagating: creates a copy of itself • Example: Unix login
Computer Viruses • Definition: A computer virus is a program that inserts itself into one or more files and then performs some (possibly null) action.
Boot Sector Infectors • Inserts itself into boot sector of a disk • Executes when disk is read • Moves real boot sector to another location on disk
Executable Infectors • Infects executable programs • Places its code at beginning of executable segment • Example: Jerusalem Virus
Jerusalem Virus (1/3) • Puts 0E0H into register ax • Invokes DOS service interrupt • If high 8 bits of ax contain 03H, system is already infected: quits and invokes original program • Otherwise, gets ready to trap calls to DOS service interrupt vector
Jerusalem Virus (2/3) • Check the year • If 1987 do nothing • Else, if not Friday the 13th sets up to respond to clock interrupts • Loads and executes original program • Stays in memory waiting for DOS service interrupt
Jerusalem Virus (3/3) • If Friday the 13th and not 1987 • Sets flag in memory to be destructive: will delete files instead of infecting them. • Once in memory, all call to DOS service interrupt are checked: • Infects or deletes as per memory flag • Preserves date and time of modification when infecting
Multipartite Viruses • Can infect whether boot sectors or applications • Has 2 parts, one for boot records, one for executable files
Terminate and Stay Resident (TSR) Viruses • Stays active (resident) in memory after the application has terminated. • Example: Jerusalem Virus
Stealth Viruses • Conceal the infection of files • Intercept call to file access routines • read requests: disinfect as data is returned • execute requests: infected file is executed
Encrypted Viruses • Enciphers all of the virus code except for a small decryption routine • Prevents pattern-matching virus detectors from recognizing virus
Polymorphic Viruses • Changes its form each time it inserts itself into another program • May be used with encryption to change pattern of decryption routine
Macro Viruses • Sequence of instructions that is interpreted rather than executed directly • Example: VB viruses
Computer Worms • Program that copies itself from one computer to another • Usual intent is to propagate without causing additional harm • Example: Internet Worm of 1988
Rabbits and Bacterium • Program that absorbs all of some class of resource • May not consume all resources, just all of a particular class
Logic Bombs • Program that performs an action that violates the security policy when some external event occurs • May be linked to termination of an employee