Computer viruses: theory and experiments
Computers and Security
On the implications of computer viruses and methods of defense
Computers and Security
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
The “worm” programs—early experience with a distributed computation
Communications of the ACM
Hi-index | 0.00 |
Computer viruses can be used by their authors to harness the resources of infected machines for the author's computation. By doing so without the permission or knowledge of the machine owners, viruses can be used to perform covert distributed processing. We outline the class of problems for which covert distributed processing can be used. A brute-force attack on cryptosystems is one such problem, and we give estimates of the time required to complete such an attack covertly.