Skip to main content

Companion Viruses and the Macintosh: Threats and Countermeasures

  • Conference paper
  • First Online:
  • 401 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1587))

Abstract

This paper reports on how some features of the Macintosh operating system, versions 7.1 through 8.1 and perhaps later versions, could be used to implement a virus attack unlike any seen previously on the Macintosh, but which bears some resemblance to a “Companion Virus” style of attack as seen under MS-DOS. We briefly discuss some methods used in the implementation of companion viruses under MS- DOS, and also examine techniques used by other Macintosh viruses. Following an examination of the details of our attack, we discuss generic countermeasures to a virus using the attack, one of which in particular appears very effective against the attack.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. F. Cohen. A Short Course on Computer Viruses. John Wiley & Sons, Inc., 1994.

    Google Scholar 

  2. F. Cohen. Computational aspects of computer viruses. Computers & Security, 8:325–344, 1989.

    Article  Google Scholar 

  3. V. Bontchev. Are ‘good’ computer viruses still a bad idea? In Proceedings of the EICAR’ 94 Conference, pages 25–47, 1994. Available online from ftp://ftp.informatik.uni-hamburg.de/pub/virus/texts/viruses/goodvir.zip.

  4. V. Bontchev. Possible virus attacks against integrity programs and how to prevent them. In Proc. Second International Virus Bulletin Conf., pages 131–141, 1992. Available online from ftp://ftp.informatik.uni-hamburg.de/pub/virus/texts/viruses/attacks.zip.

  5. S. Magruder. High-level language computer viruses — a new threat? Computers & Security, 13(3):263–269, 1994.

    Article  Google Scholar 

  6. Apple Computer Inc. Inside Macintosh: PowerPC System Software. Addison-Wesley Publishing Company, 1994.

    Google Scholar 

  7. Apple Computer Inc. Inside Macintosh: Files. Addison-Wesley Publishing Company, 1992.

    Google Scholar 

  8. Apple Computer Inc. Inside Macintosh: Processes. Addison-Wesley Publishing Company, 1992.

    Google Scholar 

  9. David Ferbrache. Virus Analysis: nVIR and its Clones. Virus Bulletin, pages 13–14, October 1989.

    Google Scholar 

  10. David Ferbrache. Macintosh Viruses: INIT 29 — Infectious, but your data is safe. Virus Bulletin, pages 8–9, December 1989.

    Google Scholar 

  11. Known Apple Macintosh Viruses. Virus Bulletin, pages 12–13, August 1992.

    Google Scholar 

  12. Apple Computer Inc. Inside Macintosh: Operating System Utilities. Addison-Wesley Publishing Company, 1994.

    Google Scholar 

  13. Mac viruses: An update. Virus Bulletin, pages 14–15, May 1995.

    Google Scholar 

  14. David Ferbrache. Virus Report: WDEF — The Hidden Virus. Virus Bulletin, page 14, January 1990.

    Google Scholar 

  15. David Ferbrache. Dirty Macs. Virus Bulletin, pages 17–18, February 1992.

    Google Scholar 

  16. Craig Jackson. Worms in the ripe apple. Virus Bulletin, pages 6–8, July 1998.

    Google Scholar 

  17. Apple Computer Inc. Inside Macintosh: More Macintosh Toolbox. Addison-Wesley Publishing Company, 1993.

    Google Scholar 

  18. TB 19 — How PBDTGetAPPL chooses which copy of an App to launch. Available online from http://developer.apple.com/qa/tb/tb19.html.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Horton, J., Seberry, J. (1999). Companion Viruses and the Macintosh: Threats and Countermeasures. In: Pieprzyk, J., Safavi-Naini, R., Seberry, J. (eds) Information Security and Privacy. ACISP 1999. Lecture Notes in Computer Science, vol 1587. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48970-3_17

Download citation

  • DOI: https://doi.org/10.1007/3-540-48970-3_17

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65756-9

  • Online ISBN: 978-3-540-48970-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics