O'Reilly logo

Crimeware by Zulfikar Ramzan, Markus Jakobsson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 15. Crimeware and Trusted Computing

Shane Balfe, Eimear Gallery, Chris J. Mitchell, and Kenneth G. Paterson

Trusted computing technology has been put forward as a potentially revolutionary addition to the field of information security. In this chapter, we examine how trusted computing may be used to defend against the ever-growing threat posed by crimeware. We also highlight a counterintuitive but important use of trusted computing, as a possible facilitator of cybercrime.

15.1 Introduction

The anonymous and international nature of the Internet makes cybercrime a potentially low-risk, high-return activity. Traditionally, the appropriation of user data through “phishing” attacks has relied on social engineering techniques in which a ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required