Pages Menu
TwitterRssFacebook
Categories Menu

Posted by on Aug 21, 2012 in Software |

Virus Frankenstein is built with parts of your PC software

Virus Frankenstein is built with parts of your PC software

The monster known as Frankenstein, Mary Shelley’s novel, was built from parts of human bodies. Now, a group of computer scientists did the same, but with pieces of software, demonstrating the potential for future new undetectable virus, which perform their tasks stealing code harmless programs we have in our PC.

The was named Frankenstein and was created by Kevin Hamlen Vishwath Mohan and the University of Texas. Once it infects a PC, Frankenstein seeks common software like Notepad or Internet Explorer, copiándoles pieces of code. These parts are transformed into “gadgets”, small statements that perform a simple task.

Frankenstein follow some rules that was scheduled to specify certain tasks. To meet them, make the gadgets from the copied code, allowing you to run the function you need.

So far, this virus was in theory possible. With enough gadgets, it would be possible to build any computer software – or malware.

“The test we chose algorithms are simpler than a full malware, but represent the type of core logic that actual malware used to unpacked. We believe this is a strong indicator that this could escalate to a full malware, “said Hamlen.

The creation of gadgets occurs whenever a new computer infects Frankenstein, creating new gadgets from the programs available, which means that malware never looks the same, although the effects are the same.

The research was funded in part by the U.S. Air Force, clearly with the intention of using it for “national security” – in espionage activities as the enemy, for example.

The current malware and attempts to mutate their code to some extent, however, the virus can recognize that this is an evil thing. As Frankenstein is different in all of its code, can be adapted to look like an ordinary software, making it difficult to detect.

Frankenstein primary need instructions on how to assemble its gadgets. If that statement is too specific, the virus does not have many options regarding which gadgets to use, what would lower the variability, making it easier to detect. For now, the virus can not use instructions that are too broad, specifying only the effects of malware.

Surely if Frankenstein becomes a threat outside the laboratory, it will be very difficult to detect by software that exists today. Perhaps one possibility is that the antivirus observe the behavior of a program, and not only seek specific code.

Link: Frankenstein Creates malware virus by pilfering code (NewScientist)

Tags: , , , ,