Mailinglist Archive
| Malicious cryptography, part 1
|
| From: | Joe Klemmer |
| Date: | Wed, 10 May 2006 13:21:53 -0400
|
Malicious cryptography, part 1
By Frederic Raynal
This two-part article series looks at how cryptography is a double-edged
sword: it is used to make us safer, but it is also being used for
malicious purposes within sophisticated viruses. Part one introduces the
concepts behind cryptovirology and offers examples of malicious
potential with the SuckIt rootkit and a possible SSH worm. It then
introduces armored viruses that use shape shifting (polymorphism and
metamorphism) to avoid detection.
http://www.securityfocus.com/infocus/1865