Lec 12: Malware 1: Viruses and Virus-Defense Flashcards

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Once you’ve compromised sysem, then what does the malicious software do?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a virus? What do they require to activate?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a virus writer’s goals?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the kinds of viruses?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the things that boot sector viruses affect?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do boot sector viruses work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why attack the bootstrap?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does a virus attach to host code?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are entry-point obscuring viruses?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are polymorphic viruses?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are metamorphic viruses?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Where else can viruses reside?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are macros and how prevalant are they?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How was Melissa Macro Virus implemented andw hat was the strategy?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What was the behavior of Melissa Macro Virus?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the source code of melissa virus?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the transmission rate, damage, and remedy to Melissa macro virus?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How do you detect viruses?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are virus signatures? How are they used?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the issues involved with scanning for virus signatures?

A
22
Q

What are the steps of a simple virus?

A
  1. User runs an infected program
  2. Program transfers control to the virus.
  3. Virus locates a new program
  4. Virus appends ts logic to the end of the new file
  5. virus updates the new program so the virus gets control when the program is launched
23
Q

What are head/tail scanners?

A
24
Q

With knowledge of head/tail scanners, what did the bad guys do?

A
25
Q

What is scalpel scanning?

A
26
Q

What are encrypted viruses and how do they work?

A
27
Q

What are encrypted viruses?

A
28
Q

What makes encrypted viruses easy to detect?

A
29
Q

How do polymorphic viruses work?

A
30
Q

What are the steps of the polymorphic virus?

A
  1. User executes program
  2. virus decrypts itself
  3. virus finds new progg
  4. mutation engine creates new decryptor
  5. virus makes a new copy of itself and encrypts this copy
  6. virus appends the new decryptor and encrypted virus body to new file
  7. End. we have a new infection
31
Q

What does the decryption loop from the polymorphic virus look like?

A
  • main point is that there are new ones generated making them more dificult to detect
32
Q

How do you detect the polymorphic virus?

A
33
Q

What is the x-ray technique?

A
  • A way to detect the polymorphic virus
  • plaintext attack on encrypted virus body
34
Q

What is “Generic” decryption? What are the assumptions? What is the key idea?

A
35
Q

What are the steps for how Generic Decryption works?

A
  1. Load suspected program into VM
  2. Allow the program to execute normally
  3. “Tag” all modified memory as the program executes
  4. 1 fetch byte
  5. 2 decrypt byte
  6. 3 store byte
  7. 4 loop to 1
  8. 5 and it goes on..
  9. Scan all modified areas of virtual memroy for virus signatures
  10. Kill virus
36
Q

What are the challenges with Generic Decryption (GD)?

A
37
Q

What is profile-based emulation?

A
38
Q

What does having profiles specific to each polymorphic virus do in profile-based emulation?

A
39
Q

What are problems with profile-based emulation and Generic Decryption in general?

A
40
Q

How do entry-point obscuring viruses work?

A
41
Q

What to do against entry-point obscuring viruses?

A
42
Q

What is a metamorphic virus? What are the problems they cause?

A
43
Q

What is an integrated infection and what are the problems they cause?

A
44
Q

What are Modern AV programs?

A
45
Q

What are the advantages and disadvantages to virus scanning?

A
46
Q

What is innoculation? What are the drawbacks?

A
47
Q

What are integrity checks & whitelists?

A
48
Q

What are the advantages and disadvantages of integrity checks?

A
49
Q

How does behavior-based detection work?

A
50
Q

What are the advantages and disadvantages of behavior-based detection?

A
51
Q

What are reputation systems?

A
52
Q

What is the difference between standard disinfection vs generic disinfection?

A