An Examination of the Operational Requirements of Weaponised Malware

Abstract:
Malware is often used in cyberconflict scenarios. Both nation-states and non-nation threat actor groups utilise malware to execute cyberattacks. The current study examines the general role of weaponised malware in cyber conflicts and outlines the operational requirements for such weaponisation of malware. Operational needs as well as ethical considerations, including target discrimination, are examined. One goal of this study is to propose a particular taxonomy for malware that is oriented to appropriate selection of weaponised malware for cyberwarfare scenarios.
AUTHORS

Vanderbilt University and Georgetown University
Knoxville, Tennessee and Washington D.C., United States of America
Dr. Chuck Easttom is the author of 40 books, including several on computer security, forensics, and cryptography. His books are used at over 60 universities. He has also authored scientific papers (over 70 so far) on digital forensics, machine learning/AI, cyber warfare, cryptography, bioengineering, and applied mathematics. He is an inventor with 26 computer science patents. He holds a Doctor of Science (D.Sc.) in cyber security (dissertation topic: “A Comparative Study of Lattice Based Algorithms for Post Quantum Computing”) and a Ph.D. in Technology focused on nanotechnology (dissertation topic: “The Effects of Complexity on Carbon Nanotube Failures”), and a Ph.D. in computer science with emphasis on applied mathematics (dissertation topic: “A Systematic Framework for Network Forensics Using Graph Theory”), as well as four master’s degrees (one in applied computer science, one in education, one in strategic and defense studies, and one in systems engineering). He is a Senior Member of the IEEE and a Senior Member of the ACM as well. He is also a Distinguished Speaker of the ACM (Association of Computing Machinery). and a Distinguished Visitor of the IEEE Computer Society. Dr. Easttom is an adjunct professor for both Vanderbilt University and Georgetown University.
Published In
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive