Malware, Software Insecurity




CS166

Chris Pollett

Dec 3, 2012

Outline

Morris Worm

How Morris Worm Spread

Bootstrap Loader

How to Remain Undetected?

Morris Worm: Bottom Line

Code Red Worm

Code Red: What it Did

SQL Slammer

Graphs of Spread of SQL Slammer

Why was Slammer Successful?

Trojan Horse Example

Mac Trojan

Trojan Example

Mac Trojan Folder View

Quiz

Which of the following is true?

  1. Kerberos makes use of public key cryptography.
  2. A buffer stored as a local variable cannot cause a buffer overflow software flaw.
  3. A race condition flaw might occur if a security process is not atomic.

Malware Detection

Signature Detection

Signature Detection - Pros and Cons

Change Detection

Change Detection - Pros and Cons

Anomaly Detection

Anomaly Detection -- Pros and Cons

Future of Malware

Encrypted Viruses

How to detect encrypted viruses?

Polymorphic Malware

Metamorphic Malware

Metamorphic Worm

Warhol Worm

A Possible Warhol Worm

Flash Worm

Flash Worm

Flash Worm Replication

Flash Worm

Rapid Malware Defenses

Botnet

Botnet Examples

More Botnet Examples

SRE - Software Reverse Engineering

SRE

SRE Tools