Formalization of Viruses and Malware Through Process Algebras

作者: Grégoire Jacob , Eric Filiol , Hervé Debar

DOI: 10.1109/ARES.2010.59

关键词:

摘要: Abstract virology has seen the apparition of successive viral models, all based on Turing-equivalent formalisms. Considering recent malware, these are only partially covered because functional formalisms do not support interactive computations. This article provides a basis for unified malware model, founded Join-Calculus. In terms expressiveness, process-based model supports fundamental notion self-replication but also interactions, concurrency and non-termination to cover evolved malware. protection, detection undecidability prevention by isolation still hold. Additional results established: calculus fragments where is decidable, definition non-infection property, potential solutions restrict propagation.

参考文章(19)
Matthew Hennessy, James Riely, Information flow vs. resource access in the asynchronous pi-calculus ACM Transactions on Programming Languages and Systems. ,vol. 24, pp. 566- 591 ,(2002) , 10.1145/570886.570890
Z. Zuo, Some Further Theoretical Results about Computer Viruses The Computer Journal. ,vol. 47, pp. 627- 633 ,(2004) , 10.1093/COMJNL/47.6.627
Arthur W. Burks, John Von Neumann, Theory Of Self Reproducing Automata ,(1966)
G. Bonfante, M. Kaczmarek, J.-Y. Marion, On abstract computer virology from a recursion theoretic perspective Journal in Computer Virology. ,vol. 1, pp. 45- 54 ,(2006) , 10.1007/S11416-005-0007-4
Matt Webster, Grant Malcolm, Reproducer Classification Using the Theory of Affordances Artificial Life. pp. 115- 122 ,(2007) , 10.1109/ALIFE.2007.367786
Grégoire Jacob, Eric Filiol, Hervé Debar, Malware as interaction machines: a new framework for behavior modelling Journal in Computer Virology. ,vol. 4, pp. 235- 250 ,(2008) , 10.1007/S11416-008-0085-1
Fred Cohen, Computer viruses—theory and experiments Rogue programs: viruses, worms and Trojan horses. pp. 356- 378 ,(1990)
Leonard M. Adleman, An abstract theory of computer viruses Rogue programs: viruses, worms and Trojan horses. pp. 307- 323 ,(1990)
Greg Hoglund, Jamie Butler, Rootkits: Subverting the Windows Kernel ,(2005)