By timothy from Slashdot's vould-have-an-enormous-schwangstucker department
mikejuk writes "A recent research technique manages to hide malware by stitching together bits of program that are already installed in the system to create the functionality required. Although the Frankenstein system is only a proof of concept, and the code created just did some simple tasks, sorting and XORing, without having the ability to replicate, computer scientists from University of Texas, Dallas, have proved that the method is viable. What it does is to scan the machine's disk for fragments of code, gadgets, that do simple standard tasks. Each task can have multiple gadgets that can be used to implement it and each gadget does a lot of irrelevant things as well as the main task. The code that you get when you stitch a collection of gadgets together is never the same and this makes it difficult to detect the malware using a signature. Compared to the existing techniques of hiding malware the Frankenstein approach has lots of advantages — the question is, is it already in use?"
Except for the malware part, this has a certain familiar ring
.Read Replies (0)
By timothy from Slashdot's frankenstein-program-stitches-them-together department
writes "Scientists at DARPA say there are some 1,300 satellites worth over $300B sitting out in Earth's geostationary orbit (GEO) that could be retrofitted or harvested for new communications roles and it designed a program called Phoenix which it says would use a squadron 'satlets' and a larger tender craft to grab out-of-commission satellites and retrofit or retrieve them for parts or reuse."
This program incorporates a design challenge aspect, in which various teams compete to design systems to effect the actual capture. From the article: "In the Zero Robotics challenge, three finalist teams emerged from a series of four, one-week qualifying rounds: "y0b0tics!" (Montclair, NJ); "The Catcher in the Skye" (Sparta, NJ); and "Nitro" (Eagleville, PA). Then in June the teams gathered at the Massachusetts Institute of Technology to watch via video link as their algorithms were tested on board the ISS, DARPA said. The algorithms were applied across three situations in which the SPHERES satellite simulated an active spacecraft approaching an object tumbling through space. In each scenario, at least one of the teams was able to approach the tumbling target and remain synchronized within the predefined capture region, DARPA said."Read Replies (0)