Skip to main content
Top

2015 | OriginalPaper | Chapter

Immune Systems in Computer Virology

Authors : Guillaume Bonfante, Mohamed El-Aqqad, Benjamin Greenbaum, Mathieu Hoyrup

Published in: Evolving Computability

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The analogy between computer viruses and biological viruses, from which computer viruses get their name [7], has been clear for the past several decades. During that time there has been progress in both understanding the vast diversity of biological viruses, and in abstract approaches to understanding computer viruses.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Adleman, L.M.: An abstract theory of computer viruses. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 354–374. Springer, Heidelberg (1990) CrossRef Adleman, L.M.: An abstract theory of computer viruses. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 354–374. Springer, Heidelberg (1990) CrossRef
2.
go back to reference Amtoft, T., Thomas, H., Jesper, N., Träff, L., Jones, N.D.: Experiments with implementations of two theoretical constructions. In: Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, PLAS 2007, San Diego, California, USA, 14 June 2007, pp. 47–52. ACM (2007) Amtoft, T., Thomas, H., Jesper, N., Träff, L., Jones, N.D.: Experiments with implementations of two theoretical constructions. In: Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, PLAS 2007, San Diego, California, USA, 14 June 2007, pp. 47–52. ACM (2007)
3.
go back to reference Bonfante, G., Kaczmarek, M., Marion, J.-Y.: A classification of viruses through recursion theorems. In: Cooper, S.B., Löwe, B., Sorbi, A. (eds.) CiE 2007. LNCS, vol. 4497, pp. 73–82. Springer, Heidelberg (2007) CrossRef Bonfante, G., Kaczmarek, M., Marion, J.-Y.: A classification of viruses through recursion theorems. In: Cooper, S.B., Löwe, B., Sorbi, A. (eds.) CiE 2007. LNCS, vol. 4497, pp. 73–82. Springer, Heidelberg (2007) CrossRef
4.
go back to reference Borello, J.-M., Mé, L.: Code obfuscation techniques for metamorphic viruses. J. Comput. Virol. 4(3), 211–220 (2008)CrossRef Borello, J.-M., Mé, L.: Code obfuscation techniques for metamorphic viruses. J. Comput. Virol. 4(3), 211–220 (2008)CrossRef
5.
go back to reference Case, J., Moelius, S.E.: Cautious virus detection in the extreme. In: Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, PLAS 2007, San Diego, California, USA, 14 June 2007, pp. 47–52. ACM (2007) Case, J., Moelius, S.E.: Cautious virus detection in the extreme. In: Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, PLAS 2007, San Diego, California, USA, 14 June 2007, pp. 47–52. ACM (2007)
6.
go back to reference Case, J., Moelius, S.E.: Characterizing programming systems allowing program self-reference. Theory Comput. Syst. 45(4), 756–772 (2009)MATHMathSciNetCrossRef Case, J., Moelius, S.E.: Characterizing programming systems allowing program self-reference. Theory Comput. Syst. 45(4), 756–772 (2009)MATHMathSciNetCrossRef
7.
go back to reference Cohen, F.: Computer viruses: theory and experiments. Comput. Secur. 6(1), 22–35 (1987)CrossRef Cohen, F.: Computer viruses: theory and experiments. Comput. Secur. 6(1), 22–35 (1987)CrossRef
8.
go back to reference Collberg, C., Nagra, J.: Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection, 1st edn. Addison-Wesley Professional, New Jersey (2009) Collberg, C., Nagra, J.: Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection, 1st edn. Addison-Wesley Professional, New Jersey (2009)
9.
go back to reference Jones, N.D.: Computability and Complexity, from a Programming Perspective. MIT press, Cambridge (1997) MATH Jones, N.D.: Computability and Complexity, from a Programming Perspective. MIT press, Cambridge (1997) MATH
10.
go back to reference Moss, L.S.: Recursion theorems and self-replication via text register machine programs. Bull. EATCS 89, 171–182 (2006)MATHMathSciNet Moss, L.S.: Recursion theorems and self-replication via text register machine programs. Bull. EATCS 89, 171–182 (2006)MATHMathSciNet
11.
go back to reference Rogers Jr., H.: Theory of Recursive Functions and Effective Computability. McGraw Hill, New York (1967) MATH Rogers Jr., H.: Theory of Recursive Functions and Effective Computability. McGraw Hill, New York (1967) MATH
12.
go back to reference Smullyan, R.M.: Recursion Theory for Metamathematics. Oxford University Press, Oxford (1993) MATH Smullyan, R.M.: Recursion Theory for Metamathematics. Oxford University Press, Oxford (1993) MATH
13.
go back to reference Zuo, Z., Zhou, M.: Some further theorical results about computer viruses. Comput. J. 47(6), 627–633 (2004)CrossRef Zuo, Z., Zhou, M.: Some further theorical results about computer viruses. Comput. J. 47(6), 627–633 (2004)CrossRef
Metadata
Title
Immune Systems in Computer Virology
Authors
Guillaume Bonfante
Mohamed El-Aqqad
Benjamin Greenbaum
Mathieu Hoyrup
Copyright Year
2015
DOI
https://doi.org/10.1007/978-3-319-20028-6_13

Premium Partner