Language Model Generated Injection Attacks

Discussion in 'other anti-virus software' started by guest, Mar 11, 2010.

Thread Status:
Not open for further replies.
  1. guest

    guest Guest

  2. gnervt

    gnervt Registered Member

    Joined:
    May 6, 2005
    Posts:
    56
    Location:
    Germany
    Many thanks for that!
     
  3. CloneRanger

    CloneRanger Registered Member

    Joined:
    Jan 4, 2006
    Posts:
    4,978
    Sounds like one for Rmus :D

    cia.gif

    Wonder how long before we see some nasties out there in the wild made using this technique ?
     
  4. Kees1958

    Kees1958 Registered Member

    Joined:
    Jul 8, 2006
    Posts:
    5,857
    It is far fetched. Problem with this theoretical approach is that program logic demands a more less fixed sequence of commands, There is off course some room for code placement, but it would be very hard to construct natural language out of it.

    Mythbusters would classify this as faintly possible, but very unlikely it has happened (will happen in practise) as the myth claims.

    This is just another (next) step in code hiding.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.