Black Hat Collection
Research performed on exploiting software-based vulnerabilites to intrude a remote node (based on the Von Neumann architecture) over the network and inject malicious code (malware). This is achieved by exploiting a buffer overflow error to smash the call stack. SenSys and SpySense attack tools are the first to show how such a malware can be crafted to become a self-replicating worm, which infects the network in a hop-by-hop manner, and a "Trojan horse" for permanently injecting spying exploits.
The knowledge acquired was disseminated to the research community through 6 publications in top tier journals and conference proceedings (including the prestigious Black Hat conference) and invited talks to universities and security-related events. Also, the tools received international media attention by Reuters and Forbes that dedicated articles about their importance and impact on commercially used networks:
- Article at Forbes Magazine blog, posted by Andy Greenberg.
- Article at H Security blog, posted by Uli Ries.
- Artilce at Sensor Network Security magazine, posted by Melanie Martella.
- Article at Cyber Arms-Computer Security blog, posted by D. Dieterle.