首页> 外文会议>International Conference on Cyber Conflict >Malware is called malicious for a reason: The risks of weaponizing code
【24h】

Malware is called malicious for a reason: The risks of weaponizing code

机译:恶意软件被称为恶意原因:武器化代码的风险

获取原文

摘要

The allure of malware, with its tremendous potential to infiltrate and disrupt digital systems, is understandable. Criminally motivated malware is now directed at all levels and corners of the cyber domain, from servers to endpoints, laptops, smartphones, tablets, and industrial control systems. A thriving underground industry today produces ever-increasing quantities of malware for a wide variety of platforms, which bad actors seem able to deploy with relative impunity. The urge to fight back with “good” malware is understandable. In this paper we review and assess the arguments for and against the use of malicious code for either active defense or direct offense. Our practical experiences analyzing and defending against malicious code suggest that the effect of deployment is hard to predict with accuracy. There is tremendous scope for unintended consequences and loss of control over the code itself. Criminals do not feel restrained by these factors and appear undeterred by moral dilemmas like collateral damage, but we argue that persons or entities considering the use of malware for “justifiable offense” or active defense need to fully understand the issues around scope, targeting, control, blowback, and arming the adversary. Using existing open source literature and commentary on this topic we review the arguments for and against the use of “malicious” code for “righteous” purposes, introducing the term “righteous malware”. We will cite select instances of prior malicious code deployment to reveal lessons learned for future missions. In the process, we will refer to a range of techniques employed by criminally-motivated malware authors to evade detection, amplify infection, leverage investment, and execute objectives that range from denial of service to information stealing, fraudulent, revenue generation, blackmail and surveillance. Examples of failure to retain control of criminall- motivated malicious code development will also be examined for what they may tell us about code persistence and life cycles. In closing, we will present our considered opinions on the risks of weaponizing code.
机译:恶意软件的诱惑,具有巨大的渗透和破坏数字系统的巨大潜力,是可以理解的。犯罪动机恶意软件目前正在网络域的各个层面和角落,从服务器到端点,笔记本电脑,智能手机,平板电脑和工业控制系统。今天蓬勃发展的地下行业产生了各种平台的不断增加的恶意软件,这种情况似乎能够以相对棘手的障碍部署。用“好”恶意软件反击的冲动是可以理解的。在本文中,我们审查并评估使用恶意代码的论据,以便主动防御或直接违法行为。我们的实际经验分析和防御恶意代码,表明部署的效果很难以准确性预测。对代码本身的无意后果和控制丧失有巨大的范围。犯罪分子不会受到这些因素的抑制,并且道德困境如抵押品损害所呈现的,但我们认为,考虑使用恶意软件的人或实体为“合理的犯罪”或积极的防御需要充分了解范围周围的问题,目标,控制,反吹,武装对手。在本主题上使用现有的开源文献和评论我们审查了使用“恶意”代码的论点,以便“正义”目的,介绍“正义恶意软件”。我们将引用先前恶意代码部署的选择实例,以揭示为未来任务的经验教训。在此过程中,我们将指犯罪运动员作者采用的一系列技术,以逃避检测,放大感染,利用投资,并执行范围从拒绝服务到信息窃取,欺诈,收入,勒索和监视的拒绝服务。还将审查失败的例子,以保留受激励的恶意代码开发的控制,以便他们可以告诉我们代码持久性和生命周期。在结束时,我们将展示我们对武器化规范风险的看法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号