malware detection techniques 

@thegibson
"Handled by external forces" doing some heavy lifting there

re: malware detection techniques 

@thegibson I'll.... I'll be in my bunk.

malware detection techniques 

@thegibson Whoa, man, like detecting some bad vibrations. Deploy some e-sage to ward off the malware.

malware detection techniques 

@thegibson This *could* be real—technically it’s the same thing as exfiltrating private RSA keys by modeling the cpu’s multiplication circuit as an unintentional radio transmitter.

But I suspect it works a lot better in a lab, monitoring just one computer, than in a data center full of servers only some of which are running malware that it wasn’t trained on.

Would be cool to be a tech sweeping the server racks with a wand of detect malware, though. Once.

malware detection techniques 

@zwol
It might could spot crypto miners... I bet those hum real bad.
@thegibson

malware detection techniques 

@feonixrift @thegibson Yeah, especially if the miner is pounding on a hardware SHA accelerator and not much else, that ought to be a pretty robust signature. (Just make sure it doesn’t false-positive on machines that do TLS encryption all day.)

malware detection techniques 

@zwol @thegibson BRB marketing a high powered magnet as a malware removal tool for HDDs.

malware detection techniques 

@TheGibson I am… skeptical

malware detection techniques 

@thegibson "According to the research paper, the team used Convolution Neural Networks (CNN)"

I have not read the paper, but I already strongly suspect that the network is far too big for a task like this, and is overfitting to all heck.

And that's leaving aside shit like "viruses may tend to maximise either CPU or Radio depending on their goals" which is kinda the worst-case fucky-wucky of a study like this.. but worst-case fucky-wuckies happen all the time so who knows

malware detection techniques 

@thegibson the claimed detect rate is clearly bullshit, but I can see it being able to provide an IOC for coin miners and maaaaybe ransomware. I can see those having behavioral signatures enough different from normal that they'd show up in EM emissions (EDR can do it based on resource use patterns so there might be something there)

malware detection techniques 

@thegibson Some Star Trek scanner bullshit combined with actual TEMPEST, I bet it just detects heavy GPU/CPU use so your 3D videogames, Photoshop, and video rendering all look like mining/ransomware.

malware detection techniques 

@mdhughes agreed I've just never seen VanEck used for detection. :)

malware detection techniques 

@thegibson
"Was Elizabeth Holmes part of the team ?" - first comment

Sign in to participate in the conversation
hackers.town

A bunch of technomancers in the fediverse. Keep it fairly clean please. This arcology is for all who wash up upon it's digital shore.