Technical reports
A pact with the Devil
Mike Bond, George Danezis
June 2006, 14 pages
DOI: 10.48456/tr-666
Abstract
We study malware propagation strategies which exploit not the incompetence or naivety of users, but instead their own greed, malice and short-sightedness. We demonstrate that interactive propagation strategies, for example bribery and blackmail of computer users, are effective mechanisms for malware to survive and entrench, and present an example employing these techniques. We argue that in terms of propagation, there exists a continuum between legitimate applications and pure malware, rather than a quantised scale.
Full text
PDF (0.2 MB)
BibTeX record
@TechReport{UCAM-CL-TR-666, author = {Bond, Mike and Danezis, George}, title = {{A pact with the Devil}}, year = 2006, month = jun, url = {https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-666.pdf}, institution = {University of Cambridge, Computer Laboratory}, doi = {10.48456/tr-666}, number = {UCAM-CL-TR-666} }