Skip to main content
Top

2020 | OriginalPaper | Chapter

2. Computer Viruses, Malicious Logic, and Spyware

Authors : Anatoly Belous, Vitali Saladukha

Published in: Viruses, Hardware and Software Trojans

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Computer viruses, software Trojans, and spyware are discussed in this chapter. The main models of impact of software Trojans on computers, methods of introduction, and their interaction with the attacker are considered. Software keylogger, the basic principles of rootkit technologies, cookies spyware, and Regin spyware are studied in detail. Various examples are given to illustrate ways of Trojan software introduction in a standard PE file of the Microsoft Windows operating system. The peculiarities of the most well-known methods for sensitive information retrieval based on the analysis of acoustic and electromagnetic radiation, as well as the most effective methods to ensure information protection from exposure to viruses, spyware, and software Trojans are considered in detail.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference A.I. Belous, V.A. Solodukha, S.V. Shvedov, Software and Hardware Trojans—Methods of Implementation and Methods of Counteraction. The First Technical Encyclopedia, vol. 2 (TECHNOSPHERE, Moscow, 2018), p. 688. ISBN 978-5-94836-524-4 A.I. Belous, V.A. Solodukha, S.V. Shvedov, Software and Hardware Trojans—Methods of Implementation and Methods of Counteraction. The First Technical Encyclopedia, vol. 2 (TECHNOSPHERE, Moscow, 2018), p. 688. ISBN 978-5-94836-524-4
5.
go back to reference Y.F. Katorin, E.V. Kurenkov, A.V. Lysov, A.N. Ostapenko, Great Encyclopedia Of Industrial Espionage (SPb.: OOO Publishing House Polygon, 2000), p. 896 Y.F. Katorin, E.V. Kurenkov, A.V. Lysov, A.N. Ostapenko, Great Encyclopedia Of Industrial Espionage (SPb.: OOO Publishing House Polygon, 2000), p. 896
7.
go back to reference B.Y. Anin, Computer Protection (SPb.: BHV-Petersburg, 2000), p. 384 B.Y. Anin, Computer Protection (SPb.: BHV-Petersburg, 2000), p. 384
9.
go back to reference M.O. Shurdak, I.A. Lubkin, Methods and software protection code from unauthorized analysis. Softw. Prod. Syst. (4), 176–180 (2012) M.O. Shurdak, I.A. Lubkin, Methods and software protection code from unauthorized analysis. Softw. Prod. Syst. (4), 176–180 (2012)
10.
go back to reference Y.K. Yazov, A.L. Serdechny, I.A. Sharov, Methodical approach to evaluating the effectiveness of false information systems. Cyber Secur. Issues (1, 2), 55–60 (2014) Y.K. Yazov, A.L. Serdechny, I.A. Sharov, Methodical approach to evaluating the effectiveness of false information systems. Cyber Secur. Issues (1, 2), 55–60 (2014)
11.
go back to reference D.A. Kozhevnikov, R.V. Maksimov, A.V. Pavlovsky, Method of protecting a computer network (options). Patent for invention RU 2325694 C1. Publ. 27.05.2008, bul. No. 15 D.A. Kozhevnikov, R.V. Maksimov, A.V. Pavlovsky, Method of protecting a computer network (options). Patent for invention RU 2325694 C1. Publ. 27.05.2008, bul. No. 15
12.
go back to reference E.V. Grechishnikov, Y.I. Starodubtsev, A.S. Belov, I.V. Stukalov, D.Y. Vasyukov, I.V. Ivanov, Method (options) of management of tell-tale signatures of communications systems. Patent for invention RU 2450337 C1. Publ. 10.05.2012, bul. No. 13 E.V. Grechishnikov, Y.I. Starodubtsev, A.S. Belov, I.V. Stukalov, D.Y. Vasyukov, I.V. Ivanov, Method (options) of management of tell-tale signatures of communications systems. Patent for invention RU 2450337 C1. Publ. 10.05.2012, bul. No. 13
13.
go back to reference V.A. Ivanov, A.S. Belov, E.V. Grechishnikov, Y.I. Starodubtsev, V.G. Eryshov, V.V. Alasheev, I.V. Ivanov, A method of controlling the telltale signatures of a communication system. Patent for invention RU 2419153 C2. Publ. 20.05.2011, bul. No.14 V.A. Ivanov, A.S. Belov, E.V. Grechishnikov, Y.I. Starodubtsev, V.G. Eryshov, V.V. Alasheev, I.V. Ivanov, A method of controlling the telltale signatures of a communication system. Patent for invention RU 2419153 C2. Publ. 20.05.2011, bul. No.14
14.
go back to reference R. Borovko, Market for antivirus packages and anti-spam tools. cnews.ru R. Borovko, Market for antivirus packages and anti-spam tools. cnews.ru
15.
go back to reference E.S. Trubachev, Information security issues. Methods and means of protection of information resources. Bulletin of the Volzhsky University named after V.N. Tatishchev (14) (2009) E.S. Trubachev, Information security issues. Methods and means of protection of information resources. Bulletin of the Volzhsky University named after V.N. Tatishchev (14) (2009)
Metadata
Title
Computer Viruses, Malicious Logic, and Spyware
Authors
Anatoly Belous
Vitali Saladukha
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-47218-4_2