‘want My Autograph?’: the Use and Abuse of Digital Signatures by Malware

@inproceedings{Wood2010wantMA,
  title={‘want My Autograph?’: the Use and Abuse of Digital Signatures by Malware},
  author={Mike Wood},
  year={2010}
}
Encryption has always been a part of malware, from basic ROT13 string encoding to multi-layered packing algorithms. However, malware authors have discovered ways to exploit the existing strengths and weaknesses of public key cryptography in addition to their home-grown crypto. With the many layers that make up the Public Key Infrastructure (PKI) – certifi… CONTINUE READING