This paper was written within the scope of the author's own learning process, during her studies of computer science and on the basis of her own malware analyses. It was published in order to offer an introduction to several file infection techniques used by viruses, showing examples and explaining appropriate countermeasures. It is aimed at everyone who is interested in the topic of malware and does not require previous knowledge, though a basic understanding of the PE file format, virtual memory management and the Windows OS in general is advantageous.
The author apologies for grammar and/or contextual mistakes and is happy about any feedback.
Recommended Comments
Create an account or sign in to comment