Table of Contents:
  • Through hacker's eyes
  • Cryptovirology
  • Tools for security and insecurity
  • The two faces of anonymity
  • Cryptocounters
  • Computationally secure information stealing
  • Non-zero sum games and survivable malware
  • Coping with malicious software
  • The nature of Trojan horses
  • Subliminal channels
  • SETUP attack on factoring based key generation
  • SETUP attacks on discrete-log cryptosystems
  • Includes bibliographical references and index