A new architecture for decentralized software distribution that reduces reliance on DNS trust, making it nearly impossible to trick users into downloading malicious installers.
This paper would detail how a "zero-size" stream can wrap integers and cause memory corruption. It would argue for the need for sandboxed decompression or safer library wrappers for compression, moving beyond traditional signature-based malware detection. 2. Information Theory/AI Focus neil.7z
) can be used to hide malicious payloads that trigger buffer overflows in decompression routines. moving beyond traditional signature-based malware detection.
A framework for detecting malicious code by analyzing the "difficulty" of compressing it, using compression ratios as a feature for security scanners. 3. Practical/Software Engineering Focus neil.7z
"The Ghost in the Archive: Detecting AI-Generated Malware via 7z Entropy Analysis"
"Beyond the Block: Exploiting Compressed Data Integrity in Modern Archivers" Premise: Investigate how modern compression formats (like Zstandardcap Z s t a n d a r d