180 likes | 196 Views
Explore types of malicious logic like viruses, Trojan horses, and worms. Learn how they infect systems and their dangerous effects. Understand the potential threats and preventive measures for computer security.
E N D
Malicious Logic CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 25, 2004
Overview • Trojan Horses • Viruses • Other Malicious Logic
Trojan Horses • Overt effect: intended • Covert effect: unexpected • Propagating: creates a copy of itself • Example: Unix login
Computer Viruses • Definition: A computer virus is a program that inserts itself into one or more files and then performs some (possibly null) action.
Boot Sector Infectors • Inserts itself into boot sector of a disk • Executes when disk is read • Moves real boot sector to another location on disk
Executable Infectors • Infects executable programs • Places its code at beginning of executable segment • Example: Jerusalem Virus
Jerusalem Virus (1/3) • Puts 0E0H into register ax • Invokes DOS service interrupt • If high 8 bits of ax contain 03H, system is already infected: quits and invokes original program • Otherwise, gets ready to trap calls to DOS service interrupt vector
Jerusalem Virus (2/3) • Check the year • If 1987 do nothing • Else, if not Friday the 13th sets up to respond to clock interrupts • Loads and executes original program • Stays in memory waiting for DOS service interrupt
Jerusalem Virus (3/3) • If Friday the 13th and not 1987 • Sets flag in memory to be destructive: will delete files instead of infecting them. • Once in memory, all call to DOS service interrupt are checked: • Infects or deletes as per memory flag • Preserves date and time of modification when infecting
Multipartite Viruses • Can infect whether boot sectors or applications • Has 2 parts, one for boot records, one for executable files
Terminate and Stay Resident (TSR) Viruses • Stays active (resident) in memory after the application has terminated. • Example: Jerusalem Virus
Stealth Viruses • Conceal the infection of files • Intercept call to file access routines • read requests: disinfect as data is returned • execute requests: infected file is executed
Encrypted Viruses • Enciphers all of the virus code except for a small decryption routine • Prevents pattern-matching virus detectors from recognizing virus
Polymorphic Viruses • Changes its form each time it inserts itself into another program • May be used with encryption to change pattern of decryption routine
Macro Viruses • Sequence of instructions that is interpreted rather than executed directly • Example: VB viruses
Computer Worms • Program that copies itself from one computer to another • Usual intent is to propagate without causing additional harm • Example: Internet Worm of 1988
Rabbits and Bacterium • Program that absorbs all of some class of resource • May not consume all resources, just all of a particular class
Logic Bombs • Program that performs an action that violates the security policy when some external event occurs • May be linked to termination of an employee