home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.org.eff.talk
- Path: sparky!uunet!unislc!erc
- From: erc@unislc.uucp (Ed Carp)
- Subject: Re: Virus design
- X-Newsreader: TIN [version 1.1 PL6]
- References: <1992Dec29.151032.2789@nastar.uucp>
- Message-ID: <1992Dec30.223259.18751@unislc.uucp>
- Organization: Unisys Corporation SLC
- Date: Wed, 30 Dec 1992 22:32:59 GMT
- Lines: 22
-
- Pete Hardie (phardie@nastar.uucp) wrote:
-
- : If I understand the Internet Worms methodology correctly, it would have been
- : very much the same. Morris used bugs in programs to get his (wholly self-
- : contained) worm running on the new system. Most, if not all, virus detection
- : software assumes that the virus is not a self-contained entity, but a code
- : fragment that lives w/in another program executable.
-
- Which brings up another thread: the self-mutating virus. All the virus scanners
- I know of work by scanning your system for a signature generated by the virus
- when it installs itself on your system. This, of course, is to prevent the
- virus from installing itself more than once. But what if, when installing
- itself on another system, it changed the signature in a pseudo-random way
- (just for that system - a unique signature for that system, not just that virus)
- to avoid virus scanners? We could see viruses that mutate everytime they
- replicate themselves. How would one stop them without checking every possible
- digital signature? Interesting question, methinks.
- --
- Ed Carp erc@apple.com, erc@saturn.upl.com 801/538-0177
- 1935 will go down in history. For the first time, a civilized nation has
- full gun registration. Our streets will be safer, our police more efficient,
- and the world will follow our lead into the future. --Adolf Hitler
-