Last month, at
ShmooCon a
talk was given about
spatial analysis of malware samples. The technique is borrowed directly from bioinformatics. This is a great example of techniques from Biology being used effectively in the IT security realm.
I hope that the researcher involved in naming organisms based on hash algorithms chooses context triggered piecewise hashes (CTPH) AKA
fuzzy hashing or a
similarity hash algorithm rather than an algorithm like SHA512.
Google's simhash or at least the ideas of this type of algorithm would lend itself much better to the naming of organisms.
FYI: a FOSS implementation of fussy hashing is called ssdeep. The project site is
here. This is an implementation that is widely used in open source malware analysis tools like
Cuckoo Sandbox.