Skip to main content

Toward an Abstract Computer Virology

  • Conference paper
Book cover Theoretical Aspects of Computing – ICTAC 2005 (ICTAC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3722))

Included in the following conference series:

Abstract

We are concerned with theoretical aspects of computer viruses. For this, we suggest a new definition of viruses which is clearly based on the iteration theorem and above all on Kleene’s recursion theorem. We show that we capture in a natural way previous definitions, and in particular the one of Adleman. We establish generic constructions in order to construct viruses, and we illustrate them by various examples. We discuss the relationship between information theory and viruses and we propose a defense against a kind of viral propagation. Lastly, we show that virus detection is Π2-complete. However, since we are able to deal with system vulnerability, we exhibit another defense based on controlling system access.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adleman, L.: An abstract theory of computer viruses. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 354–374. Springer, Heidelberg (1990)

    Google Scholar 

  2. Bishop, M.: An overview of computer viruses in a research environment. Technical report, Hanover, NH, USA (1991)

    Google Scholar 

  3. Chess, D., White, S.: An undetectable computer virus

    Google Scholar 

  4. Cohen, F.: Computer Viruses. PhD thesis, University of Southern California (January 1986)

    Google Scholar 

  5. Cohen, F.: Computer viruses: theory and experiments. Comput. Secur. 6(1), 22–35 (1987)

    Article  Google Scholar 

  6. Cohen, F.: Models of practical defenses against computer viruses: theory and experiments. Comput. Secur. 6(1) (1987)

    Google Scholar 

  7. Davis, M.: Computability and unsolvability. McGraw-Hill, New York (1958)

    MATH  Google Scholar 

  8. Filiol, E.: Les virus informatiques: théorie, pratique et applications. Springer, Heidelberg (2004)

    MATH  Google Scholar 

  9. Goel, S., Bush, S.: Kolmogorov complexity estimates for detection of viruses in biologically inspired security systems: a comparison with traditional approaches. Complex 9(2), 54–73 (2003)

    Article  Google Scholar 

  10. Anderson, S., Thimbleby, H., Cairns, P.: A framework for medelling trojans and computer virus infection. Comput. J. 41, 444–458 (1999)

    Google Scholar 

  11. Jones, N.: Computer implementation and applications of kleene’s S-m-n and recursive theorems. In: Moschovakis, Y.N. (ed.) Lecture Notes in Mathematics, Logic From Computer Science, pp. 243–263 (1991)

    Google Scholar 

  12. Kleene, S.C.: Introduction to Metamathematics, nj edn. Van Nostrand, Princeton (1964)

    Google Scholar 

  13. Li, M., Vitányi, P.: An Introduction to Kolmogorov Complexity and its Application, 2nd edn. Springer, Heidelberg (1997)

    Google Scholar 

  14. Ludwig, M.: The Giant Black Book of Computer Viruses. American Eagle Publications (1998)

    Google Scholar 

  15. Odiffredi, P.: Classical recursion theory. North-Holland, Amsterdam (1989)

    Google Scholar 

  16. Rogers, H.: Theory of Recursive Functions and Effective Computability. McGraw Hill, New York (1967)

    MATH  Google Scholar 

  17. Szor, P.: The Art of Computer Virus Research and Defense. Addison-Wesley Professional, Reading (2005)

    Google Scholar 

  18. Turing, A., Girard, J.-Y.: La machine de Turing. Seuil (1995)

    Google Scholar 

  19. Turing, A.M.: On computable numbers with an application to the entscheidungsproblem. Proc. London Mathematical Society 42(2), 230–265 (1936) Traduction [18]

    MATH  Google Scholar 

  20. Uspenskii, V.A.: Enumeration operators ans the concept of program. Uspekhi Matematicheskikh Nauk 11 (1956)

    Google Scholar 

  21. von Neumann, J., Burks, A.W.: Theory of self-reproducing automata. University of Illinois Press, Champaign (1966)

    Google Scholar 

  22. Zuo, Z., Zhou, M.: Some further theorical results about computer viruses. The Computer Journal (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bonfante, G., Kaczmarek, M., Marion, J.Y. (2005). Toward an Abstract Computer Virology. In: Van Hung, D., Wirsing, M. (eds) Theoretical Aspects of Computing – ICTAC 2005. ICTAC 2005. Lecture Notes in Computer Science, vol 3722. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11560647_38

Download citation

  • DOI: https://doi.org/10.1007/11560647_38

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29107-7

  • Online ISBN: 978-3-540-32072-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics