Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

An Attacker’s Day into Human Virology 2: Structure and Hallmarks of the Immune System

Having introduced the subject, Guillaume Lovet breaks down the human immune system into constituents and does some comparing with computer defense mechanisms. What do we have in our bodies to fight against viruses? (see right-hand image) Basically, the immune system is divided in two different subsystems....

An Attacker’s Day into Human Virology: Human vs Computer

This entry reflects the Black Hat Europe presentation based on the research by Fortinet’s Guillaume Lovet and Axelle Apvrille, dedicated to comparing the human virus defense mechanisms with those implemented in computers. Guillaume Lovet: This presentation is a bit different from the other talks that you...

Moti Yung and Adam Young on Kleptography and Cryptovirology 6: The Summary

Having explained the concepts and applications of cryptovirology and kleptography, Moti Yung now provides a set of conclusions on the subject. I will now move to the conclusion. I showed you several malware attacks, either general malware or Trojans, I mentioned just Trojans inside cryptosystems. In each...

Moti Yung and Adam Young on Kleptography and Cryptovirology 5: Skeptical Experts and Smart Attackers

Moti Yung now outlines how the expert community and antivirus industry reacted to his and Adam Young’s book, and dwells on the applied aspects of kleptography. Reactions to “Malicious Cryptography – Exposing Cryptovirology” Book We got some reaction to what we described in our book....

Moti Yung and Adam Young on Kleptography and Cryptovirology 4: Password Snatching and Secure Info Stealing

The main subjects covered in this section are two types of attacks doable through the use of cryptovirologic techniques and aiming at latent info retrieval. The Classic and Deniable Password Snatching Attack The second idea that I will cover is password snatching that we did. A typical password snatching...

Moti Yung and Adam Young on Kleptography and Cryptovirology 3: Deploying Cryptoviral Extortion Attack

In this part, Moti Yung lists the main possible applications for cryptovirology and goes into detail of a typical cryptoviral extortion attack. Now we’re going to get to the subject of cryptovirology, and I will review three topics (see image). The first one is cryptoviral extortion; this is an active...

Moti Yung and Adam Young on Kleptography and Cryptovirology 2: Cryptography in Polymorphic Viruses

Continuing with the retrospective overview of malicious software, in this part Moti Yung focuses on the role of crypto in the execution workflow of polymorphic viruses and touches upon the basic principles of public-key cryptography. I want to point out one interesting design – actually,...

“Yes We Can’t!” – On Kleptography and Cryptovirology

This is a study conducted by computer scientists and well-known cryptographers Moti Yung and Adam Young on the two-way relation between cryptography and malicious software. The research was presented by Moti Yung at 26th Chaos Communication Congress (26C3) in Berlin. Yes, we can’t! Yes, we can or yes, we...

Mikko Hypponen on Cyber Warfare 4: Challenges of the Cyber Arms Race

This part encompasses Mikko Hypponen’s thoughts on why sophisticated viruses like Stuxnet and Flame are so hard to detect using the regular security technology. If you look at Miniflame which was found recently, one of the files actually contains country information, which tells us in which country that...

Mikko Hypponen on Cyber Warfare 3: Stuxnet as an Offensive Attack Weapon

Mr. Hypponen now draws attention to the process where computer science basically turned into an offensive weapon capable of killing people, namely Stuxnet worm. Stuxnet is the only one which actually does physical damage. It controls the PLC gear inside the Natanz nuclear enrichment facility, blowing up...