tHE mUTABLE
August 19th, 2008, 23:27
I've just released a new paper entitled "Achilles Heel in the Philosophy of Prometheus Boundless Security" at CodeBreakers-Journal or you can download a copy from my website at http://www.themutable.com (check the Publications section for a copy of the paper + POC), in which I present the security from philosophical perspective combining RCE, human factor (+ survey) and technology + POC (SC + Executable files) . I admit that it is not easy to understand and it does contain a lot of cryptic concepts that I developed on my own. It is not an easy process to fully elaborate on these ideas because it'll take me around 20 pages more to give a clear overview of what's going on behind each idea. More or less it is based on my experience with the inner and outer world in the security domain.
Here is a synopsis of the paper:
Abstract: This paper presents a semi-inclusive analysis of the current Black Box security and privacy breaches, taking into account human factor as information security involves both technology and people. Most of the problems in the security and privacy domain are of amalgamation nature, where there is no definitive embodiment of measuring the applicability of the security while the privacy is intact, especially without taking into consideration the human layer. This dispersion in the security and privacy area refers to many factors in the sphere of information distribution. Therefore, a philosophical approach will be emphasized concerning people compliance to the technology in general and to the way typical and competent end user sees the technology evolution and interaction, when a mutual symbiotic relationship should epitomize this correlation. An inductive/deductive reasoning called Shadowed Time Advancement (STA) and Probabilistic Mathematical Behavioral System (PMBS) are outlined in this paper to prove this problem by inspecting the difficulty of analyzing the system under assessment where in fact still a complete logical dissection of the outer/inner layout shell is pertinent. The degree of transparency in cyberspace is no longer valid in today’s ever mutant digital world. This can be shown by applying a heuristic attack by showing how the visibility medium is shadowed with time advancement. The fact that not all the companies consider people technology education as a must can be referred to the inconsistency in knowledge distribution. Knowing that people are anxious about the unknown, knowledge is the best counterattack against lack of knowledge; otherwise a self-destructive future will be imminent. Balance is what makes human aware of the evil spirit of this subversive world. In this paper a proof of concept is presented to show how a complete modification of an executable file could be carried out without detection.
Keywords— C++, Computer Science Philosophy, Human Factor, Privacy, Reverse Code Engineering, Security.
I hope you'll enjoy it. You are welcome for any comments, criticisms,...
Cheers,
M. F. Mokbel a.k.a tHE mUTABLE
Here is a synopsis of the paper:
Abstract: This paper presents a semi-inclusive analysis of the current Black Box security and privacy breaches, taking into account human factor as information security involves both technology and people. Most of the problems in the security and privacy domain are of amalgamation nature, where there is no definitive embodiment of measuring the applicability of the security while the privacy is intact, especially without taking into consideration the human layer. This dispersion in the security and privacy area refers to many factors in the sphere of information distribution. Therefore, a philosophical approach will be emphasized concerning people compliance to the technology in general and to the way typical and competent end user sees the technology evolution and interaction, when a mutual symbiotic relationship should epitomize this correlation. An inductive/deductive reasoning called Shadowed Time Advancement (STA) and Probabilistic Mathematical Behavioral System (PMBS) are outlined in this paper to prove this problem by inspecting the difficulty of analyzing the system under assessment where in fact still a complete logical dissection of the outer/inner layout shell is pertinent. The degree of transparency in cyberspace is no longer valid in today’s ever mutant digital world. This can be shown by applying a heuristic attack by showing how the visibility medium is shadowed with time advancement. The fact that not all the companies consider people technology education as a must can be referred to the inconsistency in knowledge distribution. Knowing that people are anxious about the unknown, knowledge is the best counterattack against lack of knowledge; otherwise a self-destructive future will be imminent. Balance is what makes human aware of the evil spirit of this subversive world. In this paper a proof of concept is presented to show how a complete modification of an executable file could be carried out without detection.
Keywords— C++, Computer Science Philosophy, Human Factor, Privacy, Reverse Code Engineering, Security.
I hope you'll enjoy it. You are welcome for any comments, criticisms,...
Cheers,
M. F. Mokbel a.k.a tHE mUTABLE