Dimensions
193 x 232 x 22mm
This book describes recent discoveries on how to design advanced malicious computer viruses, worms, and Trojan horses. The area in question has recently been dubbed Cryptovirology, since it involves the application of modern cryptographic techniques to subvert computer systems, as opposed to using cryptography to secure computer systems.
The attacks come in the form of sophisticated viral payloads and Trojan horse programs, which are specifically tailored for their hosts. The attacks that are described encompass everything from denial-of-service, to secure and anonymous theft of information, as well as attacks on smart card devices, which leak private keys securely and subliminally to the attacker. The book also provides warning and thwarting tools for prevention.