2007
DOI: 10.1007/978-3-540-73001-9_8
|View full text |Cite
|
Sign up to set email alerts
|

A Classification of Viruses Through Recursion Theorems

Abstract: We study computer virology from an abstract point of view. Viruses and worms are self-replicating programs, whose definitions are based on Kleene's second recursion theorem. We introduce a notion of delayed recursion that we apply to both Kleene's second recursion theorem and Smullyan's double recursion theorem. This leads us to define four classes of viruses, two of them being polymorphic. Then, we work on a simple imperative programming language in order to show how those theoretical constructions can be imp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0
1

Year Published

2008
2008
2017
2017

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(22 citation statements)
references
References 14 publications
0
21
0
1
Order By: Relevance
“…The key idea is the migration from abstract virology to a more operational context. The purpose is similar to the recent imperative programming language introduced by Bonfante et al in order to study the implementation of their theoretical results [22]. Unfortunately, they do not consider interactions and parallelism, which leaves some place for possible improvements.…”
Section: A Formal Semantic Based On Interactive Machines For Malware mentioning
confidence: 98%
“…The key idea is the migration from abstract virology to a more operational context. The purpose is similar to the recent imperative programming language introduced by Bonfante et al in order to study the implementation of their theoretical results [22]. Unfortunately, they do not consider interactions and parallelism, which leaves some place for possible improvements.…”
Section: A Formal Semantic Based On Interactive Machines For Malware mentioning
confidence: 98%
“…For example, Cohen describes viral behaviour using Turing machines [8], Adleman uses first-order logic [1] and Bonfante et al [3,4] base their approach on recursion theorems. Our approach differs in that the focus is not the virus's behaviour, but rather on the ecology of the virus, i.e., the environment in which reproduction takes place.…”
Section: Comparison With Other Approachesmentioning
confidence: 99%
“…[20,21] and Wehner [39] present classifications of malware based on phylogenetic trees, in which the lineage of computer viruses can be traced and a "family tree" of viruses constructed based on similar behaviours. Bonfante et al [3,4] give a classification of computer viruses based on recursion theorems. Gheorghescu [13] gives a method of classification based on reuse of code blocks across related malware strains.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…-Parasitic obfuscation that is used to append, prepend, or insert code into data sections of files on disk [4]. -Self-modification that allows malware to modify its code during every infection.…”
Section: Evading Virus Detection Technologiesmentioning
confidence: 99%