Follow

malware detection techniques 

@thegibson This *could* be real—technically it’s the same thing as exfiltrating private RSA keys by modeling the cpu’s multiplication circuit as an unintentional radio transmitter.

But I suspect it works a lot better in a lab, monitoring just one computer, than in a data center full of servers only some of which are running malware that it wasn’t trained on.

Would be cool to be a tech sweeping the server racks with a wand of detect malware, though. Once.

malware detection techniques 

@zwol
It might could spot crypto miners... I bet those hum real bad.
@thegibson

malware detection techniques 

@feonixrift @thegibson Yeah, especially if the miner is pounding on a hardware SHA accelerator and not much else, that ought to be a pretty robust signature. (Just make sure it doesn’t false-positive on machines that do TLS encryption all day.)

malware detection techniques 

@zwol @thegibson BRB marketing a high powered magnet as a malware removal tool for HDDs.

Sign in to participate in the conversation
hackers.town

A bunch of technomancers in the fediverse. This arcology is for all who wash up upon it's digital shore.