Malware

Terms and concepts you should know

Paul Krzyzanowski

March 29, 2024

  • Malware
  • Worm
  • Virus
  • Spyware
  • Backdoor
  • Ransomware
  • Exfiltration
  • Logic Bomb
  • Dropper
  • Keylogger
  • Windows Hooks
  • Zero-day Exploit
  • File Infector
  • USB and infected firmware
  • Autorun
  • Data leakage
  • Macro Viruses
  • Social Engineering
  • Phishing
  • Spear Phishing
  • Smishing
  • Hiding Malicious URLs
  • Honeypots
  • Startup Services
  • Bootkit
  • Trojan Horse
  • Overt vs. Covert Porpose
  • Rootkit
  • Kernel-mode, User-mode, and Hypervisor Rootkits
  • Signature-based Detection
  • Behavior-based Detection (Heuristic Analysis)
  • Signature Scanning
  • Virus Defenses
  • Encrypted malware
  • Packing, packer
  • Polymorphic Virus
  • Static Heuristic Analysis
  • Dynamic Heuristic Analysis
  • Sandbox
  • Sandboxing through system call Interposition
  • Problems with Janus Sandboxing
  • TOCTTOU
  • Kernel-based Sandoxing
  • seccomp-BPF
  • Browser-based sandboxing
  • NaCl static analysis
  • Inner and Outer Sandbox
  • Java sandboxing
  • Java Bytecode Verifier
  • Java Class Loader
  • Java Security Manager
Last modified March 29, 2024.
recycled pixels