Processor-Dependent Malware... and codes - Computer Science > Cryptography and SecurityReportar como inadecuado




Processor-Dependent Malware... and codes - Computer Science > Cryptography and Security - Descarga este documento en PDF. Documentación en PDF para descargar gratis. Disponible también para leer online.

Abstract: Malware usually target computers according to their operating system. Thus wehave Windows malwares, Linux malwares and so on

. In this paper, we considera different approach and show on a technical basis how easily malware canrecognize and target systems selectively, according to the onboard processorchip. This technology is very easy to build since it does not rely on deepanalysis of chip logical gates architecture. Floating Point Arithmetic FPAlooks promising to define a set of tests to identify the processor or, moreprecisely, a subset of possible processors. We give results for differentfamilies of processors: AMD, Intel Dual Core, Atom, Sparc, Digital Alpha,Cell, Atom

. As a conclusion, we propose two {\it open problems} that arenew, to the authors- knowledge.



Autor: Anthony Desnos, Robert Erra, Eric Filiol

Fuente: https://arxiv.org/







Documentos relacionados