Computer viruses can be used by their authors to harness the resources of infected machines for the author’s computation. By doing so without the permission or knowledge of the machine owners, viruses can be used to perform covert distributed processing. We outline the class of problems for which covert distributed processing can be used. A brute-force attack on cryptosystems is one such problem, and we give estimates of the time required to complete such an attack covertly.
CITATION STYLE
White, S. R. (1990). Covert distributed processing with computer viruses. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 435 LNCS, pp. 616–619). Springer Verlag. https://doi.org/10.1007/0-387-34805-0_57
Mendeley helps you to discover research relevant for your work.