Processor-Dependent Malware... and codes
@article{Desnos2010ProcessorDependentMA, title={Processor-Dependent Malware... and codes}, author={Anthony Desnos and R. Erra and Eric Filiol}, journal={ArXiv}, year={2010}, volume={abs/1011.1638} }
Malware usually target computers according to their oper- ating system. Thus we have Windows malwares, Linux malwares and so on ...In this paper, we consider a different approach and show on a technical basis how easily malware can recognize and target systems selectively, according to the onboard processor chip. This technology is very easy to build since it does not rely on deep analysis of chip logical gates architecture. Floating Point Arithmetic (FPA) looks promising to define a set of… CONTINUE READING
3 Citations
Formal Specification for Internet of Things Malware
- Computer Science
- 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE)
- 2018
Technical, legal and ethical dilemmas: distinguishing risks arising from malware and cyber-attack tools in the ‘cloud’—a forensic computing perspective
- Computer Science
- Journal of Computer Virology and Hacking Techniques
- 2012
- 12
References
SHOWING 1-10 OF 13 REFERENCES
More on algorithms that reveal properties of floating point arithmetic units
- Computer Science
- CACM
- 1974
- 44
On the time complexity of computer viruses
- Computer Science
- IEEE Transactions on Information Theory
- 2005
- 40
- PDF