Unlimited WordPress themes, plugins & video downloads!

Research

Research – forensic.ps

Software Forensics – Can We Track Code to its Authors? Viruses,worms,trojan horses,and crackers all exis tand threaten the security of our computer systems. Often, we are aware of an intrusion only after it has occurred. On some occasions, we may have a fragment of code left behind – used by an adversary to gain access or damage the system. A natural question to ask is ?Can we use this remnant of code to positively identify the culprit?? In this paper, we detail some of the features of code remnants that might be analyzed and then used to identify their authors. We further outline some of the difficulties involved in tracing an intruder by analyzing code. We conclude by discussing some future work that needs to be done before this approach can be properly evaluated. We refer to our process as software forensics, similar to medical forensics: we are examining the remains to obtain evidence about the factors involved.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/11088/forensic.ps

Source: https://packetstormsecurity.com/files/11088/forensic.ps.html

Related posts
Research

Research - EUSecWest 2010 Call For Papers

Research

Research - ewdd.pdf

Research

Research - exploit.txt

Research

Research - Exploiting DLLs: A Guide To DLL Hijacking

Sign up for our Newsletter and
stay informed