Hunting distributed malware with the κ-calculus

  • Authors:
  • Mila Dalla Preda;Cinzia Di Giusto

  • Affiliations:
  • Dipartimento di Scienze dell'Informazione, Università di Bologna, Italy;INRIA Rhône Alpes, Grenoble, France

  • Venue:
  • FCT'11 Proceedings of the 18th international conference on Fundamentals of computation theory
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

The defense of computer systems from malicious software attacks, such as viruses and worms, is a key aspect of computer security. The analogy between malicious software and biological infections suggested us to use the ?- calculus, a formalism originally developed for the analysis of biological systems, for the formalization and analysis of malicious software. By modeling the different actors involved in a malicious code attack in the k-calculus and by simulating their behavior, it is possible to extract important information that can drive in the choice of the defense technique to apply.