Download presentation
Presentation is loading. Please wait.
1
Chapter 22: Malicious Logic
Dr. Wayne Summers Department of Computer Science Columbus State University
2
Malicious Logic Malicious Logic - set of instructions that causes a site’s security policy to be violated Trojan horse – program with an overt effect and a covert effect Computer Virus - program that attaches itself to another program and attacks other software by making copies of itself boot sector infector executable infector multipartite Terminate and stay resident (TSR) Stealth Polymorphic Macro
3
Other Forms of Malicious Logic
Computer Worm – program that copies itself from one computer (typically via the network) to another. Rabbit (bacterium) - program that absorbs all of some class of resource Logic bomb – A program that is activated or triggered after or during a certain event
4
Defenses Malicious Logic can be both data and instructions
Malicious Logic can access and affect objects with a user’s protected domain by assuming the user’s rights Limit the distance a virus can spread by defining a flow distance metric Reduce the user’s protection domain when running suspected programs (principle of least privilege) Use “watchdog” (guardian) program to check if access to a file is permitted
5
Defenses Use sandbox (virtual machine) to restrict process rights
Inhibit users in different protection domains from sharing programs & data (integrity policy) Place protected programs at lowest possible level of a multilevel security policy to keep them from writing down Sign a file with a CRC to detect changes Look for signatures of malicious programs Use heuristic filters to block malicious programs (intrusion detection)
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.