Viral Art: A Gallery Of Security Threats
Using pieces of disassembled code, API calls, memory addresses and subroutines associated with virus threats, the data was analyzed by frequency, density, and groupings. Algorithms were then developed and two commissioned artists mapped the data to the inputs of the algorithms, which then generated virtual, 3D entities.