malware detection techniques Show more
@thegibson This *could* be real—technically it’s the same thing as exfiltrating private RSA keys by modeling the cpu’s multiplication circuit as an unintentional radio transmitter.
But I suspect it works a lot better in a lab, monitoring just one computer, than in a data center full of servers only some of which are running malware that it wasn’t trained on.
Would be cool to be a tech sweeping the server racks with a wand of detect malware, though. Once.
@zwol @thegibson BRB marketing a high powered magnet as a malware removal tool for HDDs.
This instance set up just for one person, but you don't have to make one for yourself. Visit https://joinmastodon.org/ to find the instance that's right for you.
Are you an academic? Try https://scholar.social/.