Super worms and crypto virology ppt slides
Posts: 14,118
Threads: 61
Joined: Oct 2014
Understanding the potential extent of future attacks is the key to successfully protecting against them. Designers of protection mechanisms must take into account the potential ferocity and sophistication of viruses that are just around the corner. That's why we think that the potentially destructive capabilities of fast-running worms such as the Warhol worm, Flash worm and Curious Yellow need to be scanned to the fullest extent possible. When re-visiting some past virus techniques, we can find some using cryptographic tools in their malicious activity. This alarming property, combined with the speed of so-called "superworms", is explored in the present work. Suggestions are given for countermeasures and future work.
The most striking and alarming trends in today's computer attacks are the high automation and speed, the increasing sophistication of attack tools, the vulnerability discovery rate that is difficult to maintain, the increased permeability of firewalls and nature Highly asymmetric threat. Monitoring organizations name worms as one of the four most alarming types of attacks today. To successfully write a cryptovirus, a deep understanding of the various cryptographic primitives such as random number generators, appropriate ciphertext stringing modes, and so on is needed. Mistaken choices can lead to poor cryptographic resistance. Therefore, the use of pre-existing routines would be ideal. Microsoft Cryptographic API (CAPI), is a possible tool for it. It has been proven that using only 8 different calls to this API, a cryptovirus can meet all your encryption needs.