<?xml version="1.0"?><rdf:RDF xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:edm="http://www.europeana.eu/schemas/edm/" xmlns:wgs84_pos="http://www.w3.org/2003/01/geo/wgs84_pos" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:rdaGr2="http://rdvocab.info/ElementsGr2" xmlns:oai="http://www.openarchives.org/OAI/2.0/" xmlns:owl="http://www.w3.org/2002/07/owl#" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:ore="http://www.openarchives.org/ore/terms/" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:dcterms="http://purl.org/dc/terms/"><edm:WebResource rdf:about="http://www.dlib.si/stream/URN:NBN:SI:DOC-XVT5W7AK/87a47dfb-59d3-4395-b02b-7d4ae76c4425/PDF"><dcterms:extent>1088 KB</dcterms:extent></edm:WebResource><edm:WebResource rdf:about="http://www.dlib.si/stream/URN:NBN:SI:DOC-XVT5W7AK/8eecae8f-2289-46ef-bbf4-37127fb3688f/TEXT"><dcterms:extent>0 KB</dcterms:extent></edm:WebResource><edm:TimeSpan rdf:about="2006-2025"><edm:begin xml:lang="en">2006</edm:begin><edm:end xml:lang="en">2025</edm:end></edm:TimeSpan><edm:ProvidedCHO rdf:about="URN:NBN:SI:DOC-XVT5W7AK"><dcterms:isPartOf rdf:resource="https://www.dlib.si/details/urn:nbn:si:spr-0y5dimiu" /><dcterms:issued>2025</dcterms:issued><dc:creator>Sedlar, Urban</dc:creator><dc:format xml:lang="sl">številka:1/2</dc:format><dc:format xml:lang="sl">letnik:92</dc:format><dc:format xml:lang="sl">str. 1-12</dc:format><dc:identifier>ISSN:0013-5852</dc:identifier><dc:identifier>COBISSID_HOST:238971395</dc:identifier><dc:identifier>URN:URN:NBN:SI:doc-XVT5W7AK</dc:identifier><dc:language>sl</dc:language><dc:publisher xml:lang="sl">Elektrotehniška zveza Slovenije</dc:publisher><dcterms:isPartOf xml:lang="sl">Elektrotehniški vestnik</dcterms:isPartOf><dc:subject xml:lang="en">attack vectors</dc:subject><dc:subject xml:lang="en">cyber security</dc:subject><dc:subject xml:lang="sl">kibernetska varnost</dc:subject><dc:subject xml:lang="en">malware</dc:subject><dc:subject xml:lang="en">reverse engineering</dc:subject><dc:subject xml:lang="sl">vektorji okužbe</dc:subject><dc:subject xml:lang="sl">vzvratni inženiring</dc:subject><dc:subject xml:lang="sl">zlonamerna programska oprema</dc:subject><dcterms:temporal rdf:resource="2006-2025" /><dc:title xml:lang="sl">Zlonamerna programska oprema – trendi, mehanizmi in primeri|</dc:title><dc:description xml:lang="sl">The paper provides an overview of the field of malware, including a brief history, characteristics, modern trends, and key techniques used. Different types of malicious software are classified based on their purpose, functionality, persistence mechanisms, and propagation methods. The analysis examines how these categories map to the MITRE ATT&amp;CK framework which is commonly used for analyzing adversarial tactics and techniques. The paper highlights popular types of malware, including ransomware, spyware, fileless malware, rootkits, botnets, viruses, worms, backdoors, and Trojan horses. It also covers key attack vectors, such as supply chain attacks, phishing, abuse of app stores, and social engineering, while explaining advanced evasion techniques, including obfuscation, anti-debugging techniques, and the use of droppers. A case study analysis presents three distinct examples of malware in detail: the WannaCry crypto worm, mobile malware from the CherryBlos family, used for the cryptocurrency theft, and a recent attempt to compromise the Linux operating system supply chain</dc:description><dc:description xml:lang="sl">Članek podaja pregled področja zlonamerne programske opreme (angl. malware), vključno s kratko zgodovino, značilnostmi, sodobnimi trendi in ključnimi tehnikami, ki jih uporablja. Različne vrste zlonamernega programja klasificiramo glede na namen, funkcionalnost, način vzdrževanja prisotnosti in metode širjenja, ter analiziramo, kako se posamezne kategorije preslikajo na okvir za analizo napadalnih taktik in tehnik organizacije MITRE, imenovan ATT&amp;CK. Posebej izpostavimo popularne tipe zlonamerne programske opreme, vključno z izsiljevalsko, vohunsko in brezdatotečno programsko opremo, korenske komplete, omrežja avtomatskih robotov, viruse, črve, skrita vrata in trojanske konje. Obravnavamo tudi ključne vektorje okužbe, kot so napadi prek dobavne verige, ribarjenje, zloraba trgovin z aplikacijami in socialni inženiring, ter pojasnimo napredne tehnike prikrivanja, vključno z obfuskacijo, izogibanjem razhroščevanju in uporabo dostavljavcev. Analiza primerov podrobneje predstavi tri raznolike primere zlonamerne programske opreme: kriptočrva WannaCry, zlonamerno mobilno aplikacijo za krajo kriptovalut iz družine CherryBlos in nedavni poskus kompromitiranja dobavne verige operacijskega sistema Linux</dc:description><edm:type>TEXT</edm:type><dc:type xml:lang="sl">znanstveno časopisje</dc:type><dc:type xml:lang="en">journals</dc:type><dc:type rdf:resource="http://www.wikidata.org/entity/Q361785" /></edm:ProvidedCHO><ore:Aggregation rdf:about="http://www.dlib.si/?URN=URN:NBN:SI:DOC-XVT5W7AK"><edm:aggregatedCHO rdf:resource="URN:NBN:SI:DOC-XVT5W7AK" /><edm:isShownBy rdf:resource="http://www.dlib.si/stream/URN:NBN:SI:DOC-XVT5W7AK/87a47dfb-59d3-4395-b02b-7d4ae76c4425/PDF" /><edm:rights rdf:resource="http://rightsstatements.org/vocab/InC/1.0/" /><edm:provider>Slovenian National E-content Aggregator</edm:provider><edm:intermediateProvider xml:lang="en">National and University Library of Slovenia</edm:intermediateProvider><edm:dataProvider xml:lang="sl">Elektrotehniška zveza Slovenije</edm:dataProvider><edm:object rdf:resource="http://www.dlib.si/streamdb/URN:NBN:SI:DOC-XVT5W7AK/maxi/edm" /><edm:isShownAt rdf:resource="http://www.dlib.si/details/URN:NBN:SI:DOC-XVT5W7AK" /></ore:Aggregation></rdf:RDF>