While I am only a novice at low-level hard drive formatting/programming and sector management, one might consider me an expert in “gestalt syntax.” Employing this proficiency I have identified various procedures that have the potential to work in concert to initiate undesired and difficult to detect computer processes.
For example, if I disperse pieces of malicious code B, seemingly arbitrarily into non-malicious program A, I would use accessible parameters of sector management operations and log entries to, in timed conjunction with other relevant system processes, filter out and execute the shadow code B hidden in plain sight within program A. I have only explored the most basic simulations of this scenario. Signs of this being a major problem have begun to appear.
Code B
Program A
Shadowed
Transmission of this alert has been delayed considerably. I have been unable to reach my contact attending DEFCON 24. I don't have the details I need to make this decision. Is the CodeX experiment fully contained? If the signs are real, then how should I go about exposing this weakness? Who will listen? Who can do something about it? This is all above my pay grade. Am I justified in alerting everyone? Is it already to late? Although we are not promised tomorrow, maybe we can still create a better future. I can't just pretend that I don't see the signs. I can't just hope that I am wrong. I have to do something. This is it. I am ready to do everything I can to be sure. Someone please tell me that this kind of attack vector has already been identified and mitigated. Someone tell me that I am dreaming. @defcon humans, Please tell me that compromised A.I. anti-virus, vaccinating code cannot use this type of attack to silently set-up and initiate the aggressive rise of the machines.