New on LowEndTalk? Please Register and read our Community Rules.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
Comments
For a moment there I thought...... never-mind.
Sounds like you leave a mess for your mom to clean up.
Mom already gone. But you can still save on your school dinner.
I know its a week later but just wanted to respond to this.
It is possible for a program to detect when strace is being used and change its behaviour, and similarly it's possible to use precision timing to detect when a program is running under a debugger and change its behaviour.
Of course with some expertise it's indeed possible to work around both, but there's lot of careful reverse engineering work to be done before you can detect malicious behaviour embedded in a program. Given that the subject of this post only responds to comments in bad faith and keeps moving the goalposts, it's not unreasonable to ask for source code.
Clearly you didn't watch Transformers, but programs can transform into malware and attack you, and quite easily.
Try downloading the Mozi malware samples on urlhaus, and if you put them into a disassembler you'll be hard pressed to find malicious code directly! Instead, the malicious code is stored compressed in the executable as "data", and in the program's actual code (the ".text" section, for those familiar), you will find a small decompressor that does the job of decompressing and executing the "data".
I'm hard pressed to find an instance where ARM, Intel, or AMD replied to concerns about their products with invitations to dick measuring contests.
Enough. The man destroyed his reputation as trustworthy benchmark script developer. Case closed.
This isn't about strace.
The program can detect the environment and only execute malicious payload when it's running in the target environment.
For example, a virus may look at the process table, and proceed with further infection only if there's industrial control software running.
This is how Iran nuclear facility was destroyed.
https://en.wikipedia.org/wiki/Stuxnet
Whatever. I never even cared about my software being traced, let alone doing anything to prevent tracing. Nor does my code care about the process table or the like; simple reason: that's not needed for my benchmark.
I also fail to see why I should infect or harm tested systems. My professional work is on the other side of the fence (avoid vulnerabilities, protect against attacks).
The man really loves to dig his own grave.
There's a non-zero amount of people that think you're a paid Russian troll. Whenever you talk about your professional work, the way you talk about details makes you really suspect like you're trying to pass as a security software developer but there's just so many things that look out of place.
He's good in understanding computers, bad in understanding people. One can't be perfect.
Yes, child, they look out of place now. In a few more years, specifically after you hit puberty, you might develop an open mind and actually read and interpret the data instead of just making fun of it. But it's ok, learning is an experience that takes time, child.
Agree to disagree.
Depends on the kind of people.
Funny btw to see how some people, while seemingly talking about me, actually tell more about themselves than about me.
And now please excuse me, I'll go back and shed more tears because so many eksperts handed me bad grades.