Weapons against Cyber-Physical Targets
Modern cyberweapons and malware are targeted bespoke software packages that bypass firewalls, virus checkers and intrusion prevention systems by appearing legitimate. Recent incidents have shown that these tools present a real threat from nation states and criminal organizations. In this paper, we p...
Saved in:
Published in | 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops pp. 321 - 326 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.07.2013
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Modern cyberweapons and malware are targeted bespoke software packages that bypass firewalls, virus checkers and intrusion prevention systems by appearing legitimate. Recent incidents have shown that these tools present a real threat from nation states and criminal organizations. In this paper, we present a systematic model for the structure and operations of these software. Their modular structure enables efficient development of malware and tailoring of mission packages for various operations. In-house development of unique software thwarts scanners. Targeting the malware to selected persons bypasses firewalls and bridges air-gaps. This rises sophistication of the malware threat to a new level and has serious implications for the protection of cyber-physical systems. |
---|---|
ISSN: | 1545-0678 2332-5666 |
DOI: | 10.1109/ICDCSW.2013.43 |