[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1278940.1278952acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article

A pact with the devil

Published: 19 September 2006 Publication History

Abstract

We study malware propagation strategies which exploit not the incompetence or naivety of users, but instead their own greed, malice and short-sightedness. We demonstrate that interactive propagation strategies, for example bribery and blackmail of computer users, are effective mechanisms for malware to survive and entrench, and present an example employing these techniques. We argue that in terms of propagation, there exists a continuum between legitimate applications and pure malware, rather than a quantised scale.

References

[1]
Camp, L. Jean; Lewis, Stephen (Eds.). "Economics of Information Security", Series: Advances in Information Security, Vol. 12, 2004.
[2]
Carl Shapiro, Hal R. Varian. "Information Rules", Harvard Business School Press (November 1, 1998).
[3]
NS Good, A Krekelberg. "Usability and privacy: a study of Kazaa P2P file-sharing" In Proc. CHI 2002, CHI Letters, 2003.
[4]
"Japanese Men Date Hot, Sexy Bots", Wired, available at http://www.wired.com/news/culture/0,1284,40369,00.html
[5]
Eugene H. Spafford. "The Internet Worm Program: An Analysis", Purdue Technical Report CSD-TR-823, 1989.
[6]
Peter Szor. "The Art of Computer Virus Research and Defence", Addison-Wesley, 2005.
[7]
RJ Anderson, RM Needham. "Programming Satan's Computer", in Computer Science Today, 1995.
[8]
David Lyon. "Surveillance Society: Monitoring Everyday Life", Open University Press, 2001.
[9]
"Back Orifice 2000", available from http://www.bo2k.com/
[10]
James Glave. "Back Orifice a Pain in the ..?", Wired, July 1998.
[11]
Andrew Odlyzko and Benjamin Tilly. "A refutation of Metcalfe's Law and a better estimate for the value of networks and network interconnections", Manuscript, March 2, 2005.
[12]
A. Young, M. Yung, "Kleptography: Using Cryptography Against Cryptography", Eurocrypt '97, page 62--74, Springer-Verlag, LNCS #1233, ISBN 3-540-62975-0
[13]
N. Eagle (2005), "Machine Perception and Learning of Complex Social Systems", Ph.D. Thesis, Program in Media Arts and Sciences, Massachusetts Institute of Technology.
[14]
"Virus Hold Computer Files 'Hostage' for $200", Fox News, 24th May 2005, available at http://www.foxnews.com/story/0,2933,157469,00.html

Cited By

View all
  • (2010)BotSwindlerProceedings of the 13th international conference on Recent advances in intrusion detection10.5555/1894166.1894176(118-137)Online publication date: 15-Sep-2010
  • (2008)Computing under occupationProceedings of the 2007 Workshop on New Security Paradigms10.1145/1600176.1600191(81-88)Online publication date: 15-Jul-2008

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
NSPW '06: Proceedings of the 2006 workshop on New security paradigms
September 2006
115 pages
ISBN:9781595939234
DOI:10.1145/1278940
  • General Chair:
  • Abe Singer
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • ACSA: Applied Computing Security Assoc

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 September 2006

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

NSPW '06
Sponsor:
  • ACSA

Acceptance Rates

Overall Acceptance Rate 98 of 265 submissions, 37%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)1
Reflects downloads up to 18 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2010)BotSwindlerProceedings of the 13th international conference on Recent advances in intrusion detection10.5555/1894166.1894176(118-137)Online publication date: 15-Sep-2010
  • (2008)Computing under occupationProceedings of the 2007 Workshop on New Security Paradigms10.1145/1600176.1600191(81-88)Online publication date: 15-Jul-2008

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media