Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
From: Gabriele Zanoni (gabriele.zanonisecurenetwork.it)
Date: Wed Sep 03 2008 - 02:45:12 CDT
I think this site could be usefull for your research:
Regards / Cordiali saluti,
Secure Network S.r.l.
Via Venezia, 23 - 20099 Sesto San Giovanni (MI) - Italia
Tel: +39 02.24126788 Mobile: +39 340.4820795
Il Tuesday 02 September 2008 12:06:47 Steve.Colemanjhuapl.edu ha scritto:
> I am currently working on a research project and designing an application
> specifically aimed at locating malicious logic embedded in source code
> (C/C++ for now, other languages will be addressed later). As a test of the
> future implementation I would like to use as many real life examples of
> code as possible. Anything that was known to have been compromised, had a
> backdoor, easter egg, or other forms of malicious or undesired logic would
> make a good test, or at least be a 'more fair' test than anything I might
> write myself.
> Because those malicious versions of Open Source projects are usually taken
> off line just as soon as the incident is discovered, I am having a
> difficult time in tracking down the specific examples that I am currently
> aware of. I therefore would like to ask if anyone out there knows of any
> collection/repository of malicious source code? If not, does anyone have
> suggestions on specific version numbers of Open Source projects (or
> available proprietary code) that I should be looking for across all the
> various Internet archives?
> Thanks in advance!
> btw - Just to keep this thread even remotely on topic the answer is yes, I
> am well aware that you can not prove a negative. So, we don't need to go
> there. ;)