NEWS - August 27, 2012
by Carol~ - 8/27/12 7:18 AM
FLAMING RETORT: Frankenstein Malware - the future of cyberwar, or just a catchy headline?
"A number of friends, acquaintances and readers have asked me recently about "the recent Frankenstein virus (pdf) research paper thing."
Bankrolled at least in part by the US Air Force, and openly touted by its authors as "a powerful tool for active defense (e.g., offensive cyber-operations)," this internet-era Modern Prometheus story has been widely covered in the technology media, often with a degree of admiration bordering on breathlessness. [Screenshot]
When I first heard the full title of the paper, Frankenstein: Stitching Malware from Benign Binaries, and realised that its goal was to come up with a strategy for deliberately creating malware that is harder to detect, my gut reaction was, "We don't need it, it won't work anyway, but it'll make catchy headlines."
Just how reasonable were my visceral and unscientific conclusions?
Very briefly explained, the authors, Vishwath Mohan and Kevin W. Hamlen, describe a mechanism for constructing malicious programs entirely out of code sequences which already appear in legitimate software installed on the victim's computer.
Continued : http://nakedsecurity.sophos.com/2012/08/27/flaming-retort-frankenstein-malware-the-future-of-cyberwar/
Related : Frankenstein virus creates malware by pilfering code