Centre for Information Security and Cryptography
Security systems that are designed in response to a specific security need and use a range of techniques, including cryptography, to achieve the stated security properties. Systematic approaches to design and evaluation of security systems will provide higher assurance about performance of the system. Malicious software aim at subverting security of the systems and gaining unauthorized privileges. Detection of malicious software and protection against them is particularly challenging because of the complexity of todays’ software system.