Frankenstein programmers test a cybersecurity monster.
University of Texas, Dallas | August 27, 2012
To catch a thief, you have to think like one. Computer scientists are trying to stay one step ahead of cyberattackers by creating their own monster. Their monster can cloak itself as it steals and reconfigures information in a computer program.
UT Dallas computer scientists are trying to stay one step ahead of cyber attackers by creating their own monster. Their monster can cloak itself as it steals and reconfigures information in a computer program.
In part because of the potentially destructive nature of their technology, creators have named this software system Frankenstein, after the monster-creating scientist in author Mary Shelley's novel, Frankenstein; or The Modern Prometheus.