Processor-Dependent Malware... and codes - Computer Science > Cryptography and SecurityReport as inadecuate




Processor-Dependent Malware... and codes - Computer Science > Cryptography and Security - Download this document for free, or read online. Document in PDF available to download.

Abstract: Malware usually target computers according to their operating system. Thus wehave Windows malwares, Linux malwares and so on

. In this paper, we considera different approach and show on a technical basis how easily malware canrecognize and target systems selectively, according to the onboard processorchip. This technology is very easy to build since it does not rely on deepanalysis of chip logical gates architecture. Floating Point Arithmetic FPAlooks promising to define a set of tests to identify the processor or, moreprecisely, a subset of possible processors. We give results for differentfamilies of processors: AMD, Intel Dual Core, Atom, Sparc, Digital Alpha,Cell, Atom

. As a conclusion, we propose two {\it open problems} that arenew, to the authors- knowledge.



Author: Anthony Desnos, Robert Erra, Eric Filiol

Source: https://arxiv.org/







Related documents