On the implications of computer viruses and methods of defense
Computers and Security
Experiments with implementations of two theoretical constructions
Logic at Botik'89 Symposium on logical foundations of computer science
A Machine-Independent Theory of the Complexity of Recursive Functions
Journal of the ACM (JACM)
Communications of the ACM
The Giant Black Book of Computer Viruses
The Giant Black Book of Computer Viruses
An Abstract Theory of Computer Viruses
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Computer viruses
Computer Viruses: from theory to applications (Collection IRIS)
Computer Viruses: from theory to applications (Collection IRIS)
Theory of Self-Reproducing Automata
Theory of Self-Reproducing Automata
Toward an abstract computer virology
ICTAC'05 Proceedings of the Second international conference on Theoretical Aspects of Computing
On the time complexity of computer viruses
IEEE Transactions on Information Theory
Cautious virus detection in the extreme
Proceedings of the 2007 workshop on Programming languages and analysis for security
Properties Complementary to Program Self-Reference
Fundamenta Informaticae
Properties complementary to program self-reference
MFCS'07 Proceedings of the 32nd international conference on Mathematical Foundations of Computer Science
Journal of Computer Security
Hi-index | 0.00 |
We study computer virology from an abstract point of view. Viruses and worms are self-replicating programs, whose constructions are essentially based on Kleene's second recursion theorem. We show that we can classify viruses as solutions of fixed point equations which are obtained from different versions of Kleene's second recursion theorem. This lead us to consider four classes of viruses which various polymorphic features. We propose to use virus distribution in order to deal with mutations.Topics covered.Computability theoretic aspects of programs, computer virology.