Authors
David Raymond, Gregory Conti, Tom Cross, Robert Fanelli
Publication date
2013/6/4
Conference
2013 5th International Conference on Cyber Conflict (CYCON 2013)
Pages
1-16
Publisher
IEEE
Description
With the recognition of cyberspace as a warfighting domain by the U.S. Department of Defense, we anticipate increased use of malicious software as weapons during hostilities between nation-states. Such conflict could occur solely on computer networks, but increasingly will be used in conjunction with traditional kinetic attack, or even to eliminate the need for kinetic attack. In either context, precise targeting and effective limiting of collateral damage from cyber weaponry are desired goals of any nation seeking to comply with the law of war. Since at least the Morris Worm, malicious software found in the wild has frequently contained mechanisms to target effectively, limit propagation, allow self-destruction, and minimize consumption of host resources to prevent detection and damage. This paper surveys major variants of malicious software from 1982 to present and synthesizes the control measures they contain that …
Total citations
20142015201620172018201920202021202220235221225224
Scholar articles
D Raymond, G Conti, T Cross, R Fanelli - 2013 5th International Conference on Cyber Conflict …, 2013