America developed Frankenstein-like computer virus

Just like the idea of ​​creating Frankenstein's monster by sewing the body parts of many different ordinary people, computer scientists are creating a virus software that is also connected by many pilfere codes from the Different normal programs.

This massive anti-virus software is thus also dubbed the Frankenstein monster, invented by scientists Vishwath Mohan and Kevin Hamlen at the University of Texas at Dallas. To make computers infected with viruses, Frankenstein software will search for code of bits and bytes of popular programs such as Internet Explorer and Notepad to perform a specific type of small task, called utilities. .

Previous studies have shown that this way will help build any computer program. Since then Mohan and Hamlen will set up Frankenstein software to build malware codes with two simple algorithms from utilities. These two algorithms are much simpler than a full-featured malware, but they are the basic logic for a malware to use to extract itself. From here will expand to a more complex malware.

Picture 1 of America developed Frankenstein-like computer virus
The United States is creating computer viruses linked from many chapters
Different processes are similar to creating Frankenstein monsters.

After being designed, Frankenstein software will have certain tasks, such as copying data pieces and swapping utilities that are capable of performing necessary tasks. The repeated swaps will help the Frankenstein virus continue to infect new computers, but with different utilities. That means, malware will always display differently to bypass antivirus software, even if the software has the same effect.

Currently, Frankenstein malware is being further tested to see how much it can potentially randomize its code so that anti-virus software is hard to detect. According to the design, Frankenstein will be able to adapt to look like normal software. Only 1/3 of Frankenstein software will provide more than 100,000 gadgets, allowing it to function like a monster. However, such design is not simple and easily leads to deviations.

The research is funded by the US Air Force, which aims to help US national security agencies penetrate enemy computers without being detected by anti-virus software.

Reference: Newscientist