home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!elroy.jpl.nasa.gov!usc!cs.utexas.edu!qt.cs.utexas.edu!yale.edu!jvnc.net!netnews.upenn.edu!netnews.cc.lehigh.edu!news
- From: celustka@sun.felk.cvut.cs (Celustkova-k336-doktorand(Richta))
- Newsgroups: comp.virus
- Subject: Good use of (possible bad) viruses
- Message-ID: <0015.9301051858.AA13030@barnabas.cert.org>
- Date: 22 Dec 92 22:04:50 GMT
- Sender: virus-l@lehigh.edu
- Lines: 54
- Approved: news@netnews.cc.lehigh.edu
-
- Hi boys and girls, (a day of inspiration,huh ?)
-
- Just one of those days...Two examples of good use of (possible bad)
- viruses come to my mind :
-
- 1. Viruses written to improve an A-V product
-
- The logic is simple. It is better that I write virus which can do this
- or that and have prepared solution to implement in my A-V product than
- wait that such virus arises in wild and then react. That means if I
- know that today exist viruses which could be stealthy, tunneling or
- polymorfic why shouldn't I write virus which is all that and design my
- A-V product to recognize such virus before it really appears in wild.
- (Well, maybe it is not commercial, I don't know). If such virus *by
- accident* escape from my lab I already have a response and there is no
- ethical problem at all.
-
- 2. Viruses built in an A-V product (it's just an idea, don't blame me if it
- is not applicable in reality)
-
- Suppose that we have an A-V product which in regular intervals or
- randomly send a virus in system. Virus (fast infector) infects only
- programs which checksum doesn't correspond to previously calculated
- values. If no such program is found virus deletes itself or removes
- from memory. If changed program found virus activates scanner to check
- if there is any known virus. If known virus is found message is sent
- to the user. If program is changed and no known virus is found the
- message is sent to the user to make decision. If decision is to leave
- program as is, virus cuts itself from the program. The whole process
- (except messages) takes place in background. There is no need for all
- A-V program (which is combination of I-checker and scanner) to be TSR,
- only virus is occasionally TSR. There is slight similarity in this
- idea with reaction of human immunity system. Anyone has ethical
- problem with her/his own immunity system ?
-
- Cheeeers,
-
- Suzana
- ____________________________________________________
- / / | |
- / |\__/| / | We wish you Merry Christmas |
- /~~~~~~\ / \ | and Happy New Year ! |
- ~\( * * )/~~\( 0 0 )/~ |______________________________|
- ( O ) ( O )
- \______/ \______/
- @/ \@ @/ \@
-
- - ---------------------------------------------------------------------------
- Address: Suzana Stojakovic-Celustka e-mail addresses:
- Department of Computers celustka@sun.felk.cvut.cs
- Faculty of Electrical Engineering celustkova@cs.felk.cvut.cs
- Karlovo namesti 13
- 12135 Prague 2 phone : (+42 2) 293485
- Czechoslovakia fax : (+42 2) 290159
-