{"?xml":{"@version":"1.0"},"edm:RDF":{"@xmlns:dc":"http://purl.org/dc/elements/1.1/","@xmlns:edm":"http://www.europeana.eu/schemas/edm/","@xmlns:wgs84_pos":"http://www.w3.org/2003/01/geo/wgs84_pos","@xmlns:foaf":"http://xmlns.com/foaf/0.1/","@xmlns:rdaGr2":"http://rdvocab.info/ElementsGr2","@xmlns:oai":"http://www.openarchives.org/OAI/2.0/","@xmlns:owl":"http://www.w3.org/2002/07/owl#","@xmlns:rdf":"http://www.w3.org/1999/02/22-rdf-syntax-ns#","@xmlns:ore":"http://www.openarchives.org/ore/terms/","@xmlns:skos":"http://www.w3.org/2004/02/skos/core#","@xmlns:dcterms":"http://purl.org/dc/terms/","edm:WebResource":[{"@rdf:about":"http://www.dlib.si/stream/URN:NBN:SI:DOC-XVT5W7AK/87a47dfb-59d3-4395-b02b-7d4ae76c4425/PDF","dcterms:extent":"1088 KB"},{"@rdf:about":"http://www.dlib.si/stream/URN:NBN:SI:DOC-XVT5W7AK/8eecae8f-2289-46ef-bbf4-37127fb3688f/TEXT","dcterms:extent":"0 KB"}],"edm:TimeSpan":{"@rdf:about":"2006-2025","edm:begin":{"@xml:lang":"en","#text":"2006"},"edm:end":{"@xml:lang":"en","#text":"2025"}},"edm:ProvidedCHO":{"@rdf:about":"URN:NBN:SI:DOC-XVT5W7AK","dcterms:isPartOf":[{"@rdf:resource":"https://www.dlib.si/details/urn:nbn:si:spr-0y5dimiu"},{"@xml:lang":"sl","#text":"Elektrotehniški vestnik"}],"dcterms:issued":"2025","dc:creator":"Sedlar, Urban","dc:format":[{"@xml:lang":"sl","#text":"številka:1/2"},{"@xml:lang":"sl","#text":"letnik:92"},{"@xml:lang":"sl","#text":"str. 1-12"}],"dc:identifier":["ISSN:0013-5852","COBISSID_HOST:238971395","URN:URN:NBN:SI:doc-XVT5W7AK"],"dc:language":"sl","dc:publisher":{"@xml:lang":"sl","#text":"Elektrotehniška zveza Slovenije"},"dc:subject":[{"@xml:lang":"en","#text":"attack vectors"},{"@xml:lang":"en","#text":"cyber security"},{"@xml:lang":"sl","#text":"kibernetska varnost"},{"@xml:lang":"en","#text":"malware"},{"@xml:lang":"en","#text":"reverse engineering"},{"@xml:lang":"sl","#text":"vektorji okužbe"},{"@xml:lang":"sl","#text":"vzvratni inženiring"},{"@xml:lang":"sl","#text":"zlonamerna programska oprema"}],"dcterms:temporal":{"@rdf:resource":"2006-2025"},"dc:title":{"@xml:lang":"sl","#text":"Zlonamerna programska oprema – trendi, mehanizmi in primeri|"},"dc:description":[{"@xml:lang":"sl","#text":"The paper provides an overview of the field of malware, including a brief history, characteristics, modern trends, and key techniques used. Different types of malicious software are classified based on their purpose, functionality, persistence mechanisms, and propagation methods. The analysis examines how these categories map to the MITRE ATT&CK framework which is commonly used for analyzing adversarial tactics and techniques. The paper highlights popular types of malware, including ransomware, spyware, fileless malware, rootkits, botnets, viruses, worms, backdoors, and Trojan horses. It also covers key attack vectors, such as supply chain attacks, phishing, abuse of app stores, and social engineering, while explaining advanced evasion techniques, including obfuscation, anti-debugging techniques, and the use of droppers. A case study analysis presents three distinct examples of malware in detail: the WannaCry crypto worm, mobile malware from the CherryBlos family, used for the cryptocurrency theft, and a recent attempt to compromise the Linux operating system supply chain"},{"@xml:lang":"sl","#text":"Članek podaja pregled področja zlonamerne programske opreme (angl. malware), vključno s kratko zgodovino, značilnostmi, sodobnimi trendi in ključnimi tehnikami, ki jih uporablja. Različne vrste zlonamernega programja klasificiramo glede na namen, funkcionalnost, način vzdrževanja prisotnosti in metode širjenja, ter analiziramo, kako se posamezne kategorije preslikajo na okvir za analizo napadalnih taktik in tehnik organizacije MITRE, imenovan ATT&CK. Posebej izpostavimo popularne tipe zlonamerne programske opreme, vključno z izsiljevalsko, vohunsko in brezdatotečno programsko opremo, korenske komplete, omrežja avtomatskih robotov, viruse, črve, skrita vrata in trojanske konje. Obravnavamo tudi ključne vektorje okužbe, kot so napadi prek dobavne verige, ribarjenje, zloraba trgovin z aplikacijami in socialni inženiring, ter pojasnimo napredne tehnike prikrivanja, vključno z obfuskacijo, izogibanjem razhroščevanju in uporabo dostavljavcev. Analiza primerov podrobneje predstavi tri raznolike primere zlonamerne programske opreme: kriptočrva WannaCry, zlonamerno mobilno aplikacijo za krajo kriptovalut iz družine CherryBlos in nedavni poskus kompromitiranja dobavne verige operacijskega sistema Linux"}],"edm:type":"TEXT","dc:type":[{"@xml:lang":"sl","#text":"znanstveno časopisje"},{"@xml:lang":"en","#text":"journals"},{"@rdf:resource":"http://www.wikidata.org/entity/Q361785"}]},"ore:Aggregation":{"@rdf:about":"http://www.dlib.si/?URN=URN:NBN:SI:DOC-XVT5W7AK","edm:aggregatedCHO":{"@rdf:resource":"URN:NBN:SI:DOC-XVT5W7AK"},"edm:isShownBy":{"@rdf:resource":"http://www.dlib.si/stream/URN:NBN:SI:DOC-XVT5W7AK/87a47dfb-59d3-4395-b02b-7d4ae76c4425/PDF"},"edm:rights":{"@rdf:resource":"http://rightsstatements.org/vocab/InC/1.0/"},"edm:provider":"Slovenian National E-content Aggregator","edm:intermediateProvider":{"@xml:lang":"en","#text":"National and University Library of Slovenia"},"edm:dataProvider":{"@xml:lang":"sl","#text":"Elektrotehniška zveza Slovenije"},"edm:object":{"@rdf:resource":"http://www.dlib.si/streamdb/URN:NBN:SI:DOC-XVT5W7AK/maxi/edm"},"edm:isShownAt":{"@rdf:resource":"http://www.dlib.si/details/URN:NBN:SI:DOC-XVT5W7AK"}}}}