2006
DOI: 10.1007/s11416-005-0008-3
|View full text |Cite
|
Sign up to set email alerts
|

Open Problems in Computer Virology

Abstract: Abstract. In this article, we briefly review some of the most important open problems in computer virology, in three different areas: theoretical computer virology, virus propagation modeling and antiviral techniques. For each area, we briefly describe the open problems, we review the state of the art, and propose promising research directions.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0
1

Year Published

2007
2007
2015
2015

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 33 publications
(18 citation statements)
references
References 26 publications
0
17
0
1
Order By: Relevance
“…Thus, the optimal control problem posed in section II can now be modified to augment (1) with (5) and (6), and omit (4b), without any alterations in the set of optimal solutions and in the maximum value of the damage function. We consider this version henceforth.…”
Section: Worm's Optimal Controlmentioning
confidence: 99%
See 2 more Smart Citations
“…Thus, the optimal control problem posed in section II can now be modified to augment (1) with (5) and (6), and omit (4b), without any alterations in the set of optimal solutions and in the maximum value of the damage function. We consider this version henceforth.…”
Section: Worm's Optimal Controlmentioning
confidence: 99%
“…This is again in contradiction with property 1. 6 For a general function f (x), the notations f (x + 0 ) and f (x − 0 ) are defined as lim x↓x 0 f (x) and lim x↑x 0 f (x), respectively. Therefore, none of the three cases could occur, which is a contradiction with existence of t * .…”
Section: Theoremmentioning
confidence: 99%
See 1 more Smart Citation
“…The first step in devising efficient countermeasures is to anticipate the hazards and understand the threats the attacks pose, before they are launched [5]. Specific attacks such as the wormhole [6], sinkhole [2], and Sybil [7], that utilize vulnerabilities in the routing protocols in a wireless sensor network, and their counter-measures, had been investigated proactively.…”
Section: A Motivation and Overturementioning
confidence: 99%
“…(e.g., a macro virus resides on a machine, another macro virus reaches it, and "mutates" into a third virus.) Filiol et al [7] analyzed the complexity of another type of viruses named k-ary viruses, which combine actions of multiple attacks. Our aim is to study the effectiveness of two techniques that have been applied in the context of "traditional" network worms: statistical analysis of content to identify portions of input that deviate from expected normal content as estimated from a training corpora, and detection of malicious behavior by dynamic execution on multiple, diverse platforms.…”
Section: Dormant Malcode In Multi-partite Attacksmentioning
confidence: 99%