malware detection techniques 

@thegibson This *could* be real—technically it’s the same thing as exfiltrating private RSA keys by modeling the cpu’s multiplication circuit as an unintentional radio transmitter.

But I suspect it works a lot better in a lab, monitoring just one computer, than in a data center full of servers only some of which are running malware that it wasn’t trained on.

Would be cool to be a tech sweeping the server racks with a wand of detect malware, though. Once.

Follow

malware detection techniques 

@zwol @thegibson BRB marketing a high powered magnet as a malware removal tool for HDDs.

Sign in to participate in the conversation
Aaron Smith

This instance set up just for one person, but you don't have to make one for yourself. Visit https://joinmastodon.org/ to find the instance that's right for you. Are you an academic? Try https://scholar.social/.