Mailinglist Archive


Malicious cryptography, part 1
From:Joe Klemmer
Date: Wed, 10 May 2006 13:21:53 -0400

Malicious cryptography, part 1
By Frederic Raynal

This two-part article series looks at how cryptography is a double-edged
sword: it is used to make us safer, but it is also being used for
malicious purposes within sophisticated viruses. Part one introduces the
concepts behind cryptovirology and offers examples of malicious
potential with the SuckIt rootkit and a possible SSH worm. It then
introduces armored viruses that use shape shifting (polymorphism and
metamorphism) to avoid detection.

http://www.securityfocus.com/infocus/1865