Skip to main content
Till KTH:s startsida Till KTH:s startsida

Black Hat Collection

Research performed on exploiting software-based vulnerabilites to intrude a remote node (based on the Von Neumann architecture) over the network and inject malicious code (malware). This is achieved by exploiting a buffer overflow error to smash the call stack. SenSys and SpySense attack tools are the first to show how such a malware can be crafted to become a self-replicating worm, which infects the network in a hop-by-hop manner, and a "Trojan horse" for permanently injecting spying exploits.

The knowledge acquired was disseminated to the research community through 6 publications in top tier journals and conference proceedings (including the prestigious Black Hat conference) and invited talks to universities and security-related events. Also, the tools received international media attention by Reuters and Forbes that dedicated articles about their importance and impact on commercially used networks: