software based attacks
DESCRIPTION
Software Based AttacksTRANSCRIPT
Software Based Attacks
Sachin SreekumarS6-CSE-25
ContentsSalami AttacksLinearization AttacksTime BombsTrusting Software
Salami Attacks
“Slices off” an amount of money from transactions.
Difficult for victim to detect.Traditional way- Slicing off fractional
cent from user’s accounts of a bank.Famous Examples:
Tax method refunding from each employee Car-Franchise in Florida Cash Register slicing off $0.01 Overstating amount in gas station
Linearization Attacks
Cracking password based on “password verification time”.
Verification is on the basis of character by character anlysis.
Input:-Correct password -> Verification Time: Maximum.
Input:-Incorrect password -> Verification Time: Minimum.
Real World Example: Attack on TENEX
So based on the delay and quickness of authenticating user Trudy can guess the character
Example:-
Time Bombs
Story of Donald Gene Burleson..Executes the virus after a
programed time.Just seed to start the virus and does
it’s job in minutes.Working method and destruction
level similar to a “Time bomb attack over a city” but here at computer level.
Trusting Software
Can you Trust a software?No program or software can be
trustedVirus can
-be any where (various file locations)-start any time (time bomb)-come in any form (language compliers,mp3,avi..etc.)
Always Stay alert.. Stay aware..
Thank You