Skip to main content
Log in

Formalisation and implementation aspects of K-ary (malicious) codes

  • Eicar 2007 Best Academic Papers
  • Published:
Journal in Computer Virology Aims and scope Submit manuscript

Abstract

This paper presents a new class of (malicious) codes denoted k-ary codes. Instead of containing the whole instructions composing the program’s action, this type of codes is composed of k distinct parts which constitute a partition of the entire code. Each of these parts contains only a subset of the instructions. When considered alone (e.g. by an antivirus) every part cannot be distinguished from a normal uninfected program while their respective action combined according to different possible modes results in the offensive behaviour. In this paper, we presents a formalisation of this type of codes by means of Boolean functions and give their detailed taxonomy. We first show that classical malware are just a particular instance of this general model then we specifically address the case of k-ary codes. We give some complexity results about their detection based on the interaction between the different parts. As a general result, the detection is proved to be NP-complete.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Bondy, J.A.: Basic Graph Theory: Paths and Circuits. In: Graham, R., Grötschel, M., Lovasz, L. (eds) Handbook of Combinatorics, Vol. 1, North Holland (1995)

  2. Cohen, F.: Computer viruses, PhD Thesis, University of Southern California (1986)

  3. De Drézigué D., Fizaine J.-P., Hansma N. (2006) In-depth analysis of the viral threats with OpenOffice.org documents. J. Comput. Virol. 2(3): 187–210

    Article  Google Scholar 

  4. Filiol, E.: Techniques de reconstruction en cryptographie et en théorie des codes. PhD Thesis, école Polytechnique (2001)

  5. Filiol, E.: Computer viruses: From theory to applications. IRIS International Series. Springer, France, ISBN 2-287-23939-1 (2005)

  6. Filiol E. (2007) Techniques virales avancées, IRIS Series, An English translation is pending (due mid-2007). Springer, France

    Google Scholar 

  7. Filiol E. (2007) Metamorhism, formal grammars and undecidable code mutation. Int. J. Appl. Math. Comput. Sci. 4(2): 503–508. http://www.waset.org/ijamcs/v4-2.html

    Google Scholar 

  8. Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness, Freeman (1979)

  9. King, S.T., Chen, P. M., Wang, Y.-M., Verbowski, C., Wang, H.J., Lorch, J.R.: SubVirt: Implementing malware With virtual machines, University of Michigan et Microsoft Research (2006)

  10. Papadimitriou, C.H.: Computational complexity. Addison-Wesley, Reading. ISBN 0-201-53082-1 (1995)

  11. Riordan J., Schneier B. (1998) Environmental key generation towards clueless agents. In: Vigna G. (eds). Mobile Agents and Security Conference’98, Lecture Notes in Computer Science. Springer, Heidelberg, pp. 15–24

    Google Scholar 

  12. Rutkowska, J.: Subverting vista kernel for fun and profit. SysCan’06 Conference, Singapore, July 21 2006

  13. Spinellis D. (2003) Reliable identification of bounded-length viruses is NP-complete. IEEE Trans. Inf. Theory 49(1): 280–284

    Article  MATH  MathSciNet  Google Scholar 

  14. Thomassen C. (1985) Even Cycles in Directed Graphs. European Journal in Combinatorics 6: 85–89

    MATH  MathSciNet  Google Scholar 

  15. Zuo Z., Zhou M. (2004) Some further theoretical results about computer viruses. Comput. J. 47(6): 627–633

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eric Filiol.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Filiol, E. Formalisation and implementation aspects of K-ary (malicious) codes. J Comput Virol 3, 75–86 (2007). https://doi.org/10.1007/s11416-007-0044-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11416-007-0044-2

Keywords

Navigation