Communications of the ACM
Password cracking: a game of wits
Communications of the ACM
The internet worm program: an analysis
ACM SIGCOMM Computer Communication Review
Rogue programs: viruses, worms and Trojan horses
Rogue programs: viruses, worms and Trojan horses
Computer viruses and anti-virus warfare
Computer viruses and anti-virus warfare
Mapping the battlefield: an overview of personal computer vulnerabilities to virus attack
Rogue programs: viruses, worms and Trojan horses
Computers under attack: intruders, worms, and viruses
Computers under attack: intruders, worms, and viruses
Liveware: a new approach to sharing data in social networks
International Journal of Man-Machine Studies - Computer-supported cooperative work and groupware. part 2
Computer security basics
The computer virus crisis (2nd ed.)
The computer virus crisis (2nd ed.)
PC viruses: detection, analysis, and cure
PC viruses: detection, analysis, and cure
Artificial life: the quest for a new creation
Artificial life: the quest for a new creation
The “worm” programs—early experience with a distributed computation
Communications of the ACM
Computer Virus Handbook
A Pathology of Computer Viruses
A Pathology of Computer Viruses
An Abstract Theory of Computer Viruses
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Watermarking, tamper-proffing, and obfuscation: tools for software protection
IEEE Transactions on Software Engineering
Self-organization and computer security: a case study in adaptive coordination
Proceedings of the 2005 ACM symposium on Applied computing
Information Security Tech. Report
Knowledge Structure on Virus for User Education
Computational Intelligence and Security
Proceedings of the 11th Annual conference on Genetic and evolutionary computation
The future of biologically-inspired security: is there anything left to learn?
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Why do we need artificial life?
Artificial Life
The ontological basis of strong artificial life
Artificial Life
AHP-based measurement and comparison of harms of computer virus
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
ChameleonSoft: Software Behavior Encryption for Moving Target Defense
Mobile Networks and Applications
Hi-index | 0.00 |
There has been considerable interest in computer viruses since they first appeared in 1981, and especially in the past few years as they have reached epidemic numbers in many personal computer environments. Viruses have been written about as a security problem, as a social problem, and as a possible means of performing useful tasks in a distributed computing environment. However, only recently have some scientists begun to ask if computer viruses are not a form of artificial life-a self-replicating organism. Simply because computer viruses do not exist as organic molecules may not be sufficient reason to dismiss the classification of this form of "vandalware" as a form of life. This paper begins with a description of how computer viruses operate and their history, and of the various ways computer viruses are structured. It then examines how viruses meet properties associated with life as defined by some researchers in the area of artificial life and self-organizing systems. The paper concludes with some comments directed toward the definition of artificially "alive" systems and experimentation.