Chapter 15. Crimeware and Trusted Computing
Shane Balfe, Eimear Gallery, Chris J. Mitchell, and Kenneth G. Paterson
Trusted computing technology has been put forward as a potentially revolutionary addition to the field of information security. In this chapter, we examine how trusted computing may be used to defend against the ever-growing threat posed by crimeware. We also highlight a counterintuitive but important use of trusted computing, as a possible facilitator of cybercrime.
15.1 Introduction
The anonymous and international nature of the Internet makes cybercrime a potentially low-risk, high-return activity. Traditionally, the appropriation of user data through “phishing” attacks has relied on social engineering techniques in which a ...
Get Crimeware now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.