Viral Art: A Gallery Of Security Threats

Using pieces of disassembled code, API calls, memory addresses and subroutines associated with virus threats, the data was analyzed by frequency, density, and groupings. Algorithms were then developed and two commissioned artists mapped the data to the inputs of the algorithms, which then generated virtual, 3D entities.


Comments are closed.