Corpus ID: 9560541

Processor-Dependent Malware... and codes

@article{Desnos2010ProcessorDependentMA,
  title={Processor-Dependent Malware... and codes},
  author={Anthony Desnos and R. Erra and Eric Filiol},
  journal={ArXiv},
  year={2010},
  volume={abs/1011.1638}
}
  • Anthony Desnos, R. Erra, Eric Filiol
  • Published 2010
  • Computer Science
  • ArXiv
  • Malware usually target computers according to their oper- ating system. Thus we have Windows malwares, Linux malwares and so on ...In this paper, we consider a different approach and show on a technical basis how easily malware can recognize and target systems selectively, according to the onboard processor chip. This technology is very easy to build since it does not rely on deep analysis of chip logical gates architecture. Floating Point Arithmetic (FPA) looks promising to define a set of… CONTINUE READING
    3 Citations
    Formal Specification for Internet of Things Malware

    References

    SHOWING 1-10 OF 13 REFERENCES
    On the time complexity of computer viruses
    • 40
    • PDF
    Arithmetic for Computers
    • 6
    Computer Viruses: from Theory to Applications
    • 113
    Numerical Computing with IEEE Floating Point Arithmetic
    • 248
    Introduction to Chaotic Dynamical Systems
    • 987
    • PDF
    Chaos and fractals - new frontiers of science
    • 1,576
    • PDF
    Fractals everywhere
    • 4,268
    • PDF