Covert Distributed Processing with Computer Viruses
暂无分享,去创建一个
Computer viruses can be used by their authors to harness the resources of infected machines for the author's computation. By doing so without the permission or knowledge of the machine owners, viruses can be used to perform covert distributed processing. We outline the class of problems for which covert distributed processing can be used. A brute-force attack on cryptosystems is one such problem, and we give estimates of the time required to complete such an attack covertly.
[1] Arjen K. Lenstra,et al. Factoring by Electronic Mail , 1990, EUROCRYPT.
[2] Whitfield Diffie,et al. Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard , 1977, Computer.
[3] John F. Shoch,et al. The “worm” programs—early experience with a distributed computation , 1982, CACM.
[4] Fred Cohen,et al. On the implications of computer viruses and methods of defense , 1988, Comput. Secur..
[5] Fred Cohen,et al. Computer viruses—theory and experiments , 1990 .