1994-06-20 - Stealth Crypto (Was: Re: Andy Grove on Clipper)

Header Data

From: jamiel@sybase.com (Jamie Lawrence)
To: cypherpunks@toad.com
Message Hash: 40073eb3ff9b5fc990a81b5c679b12d4551b9ba263501bffa809e811c59305a5
Message ID: <9406201759.AA26312@ralph.sybgate.sybase.com>
Reply To: N/A
UTC Datetime: 1994-06-20 18:00:12 UTC
Raw Date: Mon, 20 Jun 94 11:00:12 PDT

Raw message

From: jamiel@sybase.com (Jamie Lawrence)
Date: Mon, 20 Jun 94 11:00:12 PDT
To: cypherpunks@toad.com
Subject: Stealth Crypto (Was: Re: Andy Grove on Clipper)
Message-ID: <9406201759.AA26312@ralph.sybgate.sybase.com>
MIME-Version: 1.0
Content-Type: text/plain


At  2:28 AM 06/20/94 -0400, Ed Carp [Sysadmin] wrote:

>I've read about (with interest) the so-called "stealth viruses", and how they
>adapt to their environment - might crypto do the same thing?

There is no way to to translate the idea that I can see. Stealth
viruses work by patching the interrupts that AV programs watch-
(on a PC- Macs and other platforms are conceptually different)
INT 21h, etc. and the file attributes repoting mechanisms
in DOS, and lie. It is hardware specific, and I don't see anyway to
translate the concept to a networked environment in order to fool
'traffic cops.'

I wonder about the mutation engine concept, though...

-j






Thread