Download - Computer virus Speaker : 蔡尚倫. Introduction Infection target Infection techniques Outline.

Transcript
Page 1: Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.

Computer virusSpeaker : 蔡尚倫

Page 2: Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.

Introduction Infection target Infection techniques

Outline

Page 3: Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.

A malware Need permission( by accident ) to execute Will replicate, spread May have destruction

Computer virus - definition

Page 4: Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.

Stealing hard disk space or CPU time Accessing private information Corrupting data Displaying political or humorous messages Spamming their contacts Logging their keystrokes

Purpose

Page 5: Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.

• Tools, like language, tool kitsDesign

• Spread, how to extendReplication

• Active, what to do

Launch

• Evade, try not be foundDetection

Elimination

Lifetime of a virus

Page 6: Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.

System sector Network Source code File Macro

Infection target

Page 7: Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.

Two type of system sector: DBR (DOS Boot Record; DBS, DOS Boot sector) MBR (Master Boot Record; Partition sectors)

Booting process: Boot computer → BIOS → POST →DBR →MBR →

Boot Sector → OS Medium:

Floppy disk Bootable CD-ROM

System sector

Page 8: Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.

Replicate by commands or protocols of network

Remote-controllable Results:

Degrade the performance of a network Disable critical devices Network connections Stealing personnel data

Network

Page 9: Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.

Different compiler, different source code Make modifications to source code Rare

Source code

Page 10: Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.

Executable file files with .BAT, .COM, .EXE, .BIN and so on

May be partially or completely overwritten Infected files can spread across the system ,

network

Files

Page 11: Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.

Macro

Input sequence(short) map to output sequence(long)

A piece of code executes if a certain event occurs

Blur the line between executable files and data filesInfected document opened

Macros loaded

into memory

Auto macros

executed

Copy themselv

es to global

template

New documen

ts infected

Page 12: Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.

Stealth Polymorphic Metamorphic Cavity Tunneling Camouflage Bootable CD-ROM

Infection techniques

Page 13: Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.

Intercept requests Return a uninfected file Hide the modified file

Stealth

Anti-virus program

Infected file

OSRequest: Ask a file

Return another file

Page 14: Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.

To confuse anti-virus programs Change characteristics with each infection

By Encryption/decryption module But keep the algorithm intact

Insert junk instructions Exchange independent instructions Change the start address

Polymorphic

Page 15: Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.

Will reprogram itself Can translate into a temporary code Then converted back to normal code Avoid pattern recognition of anti-virus

program

Metamorphic

Virus (original)

Virus (temporary code )

Translate

Convert back

Mutate

Page 16: Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.

Also known as space-fillers Maintain a constant file-size Overwrite empty part of a target file with its

code Limit on small number of host, it is hard to

write Means rare

Cavity

Null Null Null

Null Null Null

Null Null Null

Null Null Null

Null Null Null

Some info….

code code ….

code code …. code code ….

code code …. code code ….Some info….

Fill the empty partOriginal

fileInfected file

Page 17: Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.

One way to detect virus is intercepting interrupts: Look for specific action that may signify the

presence of a virus Intercepting interrupt from the OS directly to

avoid anti-virus program use them

Tunneling

Page 18: Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.

Normal Program• send interrupt requests

Anti-virus software• Intercepting the request and check it

Operation system• Give it the permission

Tunneling - cont’d

Infected program• Back trace to the directory of DOS and BIOS interrupt handlers

• Install itself beneath this interrupt handlers

• Contact with OS directly

Page 19: Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.

Pretend itself as a normal program Usage of anti-virus program’s ignore logic Thanks to advanced virus detection, it’s rare

Camouflage

Page 20: Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.

Through infected CD-ROM If system is booted by the CD-ROM, the hard

disk must be destroyed No anti-virus program can stop it

Bootable CD-ROM

Page 21: Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.

Worms A special type of virus that can replicate itself

and use memory, but it cannot attach itself to other executable codes

Trojans A small destructive program that runs hidden

on an infected computer

Other malware

Page 22: Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.

Characteristics Standalone malware Propagation for spread from machine to

machine Do not attach themselves to an existing

program Infection techniques

Aim at security failures Via network, usually with attachment of email

Worms

Page 23: Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.

Gathering

information

• Location, port, configuration, identification

Infecting

target

• Send itself to the target machine

Payload

• Create back door, alter or destroy files, transmit psw..

• Any action other than spreading itself

Network

propagation

• Select the next target by choosing randomly or others

Worms - infecting phases

Page 24: Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.

Characteristics Non-self-replicating Do not attach themselves into files or propagate

Infection techniques (always associated with network) with malicious programs or drive-by download Normally down by social engineering

Running Automatically run after being installed Hiding in background, and create a backdoor(s),

usually

Trojans

Page 25: Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.

Destruction Password thievery Remote control Key logger DoS attack Zombie FTP Trojan

Trojans - purposes

Page 26: Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.

Thanks for listening