page 1 | page 2
Binghamton’s researchers hope to find a corporate partner to help commercialize the technique. Skormin has also begun talks with Wall Street representatives who envision applications for the
banking industry.
“The advantage of what we do is that we’re not looking back into the history of known attacks,“ he said. “We’re developing techniques that will help to oppose previously unknown viruses.“
Giordano noted that the Air Force appreciates each of these innovations. “The way we are today in an information society, ideas get generated rapidly and we have the tools to experiment,“ he said. “Things like this may make it to the market sooner than we all think.“
Skormin likes to joke that he and his team have excellent job security because there’s such creativity on each side of the information assurance battle. “When it comes to computer security, it’s an arms race,“ he said.“Each time you come up with a new way to defend a computer network, the bad guys come up with a new way to attack it. This could go on forever.“
In
computer security, a computer virus is a self-replicating computer program
that spreads by inserting copies of itself into other executable code or
documents. A computer virus behaves in a way similar to a biological virus,
which spreads by inserting itself into living cells. Extending the analogy,
the insertion of a virus into the program is termed an “infection,“ and
the infected file, or executable code that is not part of a file, is called
a “host.“ Viruses are one of the several types of malicious
software or malware. In common parlance, the term virus is often extended
to refer to worms, trojan horses and other sorts of malware; viruses in
the narrow sense of the word are less common than they used to be, compared
to other forms of malware.
While viruses can be intentionally destructive, for example, by destroying data, many other viruses are fairly benign or merely annoying. Some viruses have a delayed payload, which is sometimes called a bomb. For example, a virus might display a message on a specific day or wait until it has infected a certain number of hosts. A time root occurs during a particular date or time, and a logic bomb occurs when the user of a computer takes an action that triggers the bomb. The predominant negative effect of viruses is their uncontrolled self-reproduction, which wastes or overwhelms computer resources. — From Wikipedia
page 1 | page 2