Infection, imitation and a hierarchy of computer viruses

被引:2
作者
Zuo, Zhi-hong [1 ]
Zhu, Qing-xin [1 ]
Zhou, Ming-tian [1 ]
机构
[1] Univ Elect Sci & Technol China, Coll Comp Sci & Engn, Chengdu 610054, Sichuan, Peoples R China
关键词
computer viruses; infection; imitation; complete sets; hierarchy;
D O I
10.1016/j.cose.2006.02.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Infection is an essential character of computer viruses. In addition, computer viruses can also imitate the behavior of infected programs in some ways in order to hide themselves. In this paper we define infection and imitation mathematically, and classify computer viruses into 3 types according to their different imitation behaviors. Furthermore, we give some results about the degree of unsolvability of each type of computer viruses. We show that the set of type 0 and type 1 computer viruses is II2-complete, while the set of type 2 computer viruses is II3-complete. (C) 2006 Elsevier Ltd. All rights reserved.
引用
收藏
页码:469 / 473
页数:5
相关论文
共 50 条
[41]   The multi-step homotopy analysis method for modified epidemiological model for computer viruses [J].
Freihat A.A. ;
Zurigat M. ;
Handam A.H. .
Afrika Matematika, 2015, 26 (3-4) :585-596
[42]   Link between infection and atherosclerosis - Who are the culprits: Viruses, bacteria, both, or neither? [J].
Shah, PK .
CIRCULATION, 2001, 103 (01) :5-6
[43]   BLOOD BORNE VIRUSES - PREVENTING TRANSMISSION OF INFECTION UNDER CLINICAL AND LABORATORY ENVIRONMENTS [J].
YOSHIHARA, N .
EISEI KAGAKU-JAPANESE JOURNAL OF TOXICOLOGY AND ENVIRONMENTAL HEALTH, 1990, 36 (05) :373-384
[44]   Static analysis for the detection of metamorphic computer viruses using repeated-instructions counting heuristics [J].
Canfora, Gerardo ;
Iannaccone, Antonio Niccolo ;
Visaggio, Corrado Aaron .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2014, 10 (01) :11-27
[45]   Effects of historical co-infection on host shift abilities of exploitative and competitive viruses [J].
Singhal, Sonia ;
Turner, Paul E. .
EVOLUTION, 2021, 75 (07) :1878-1888
[46]   Eight-year-olds' naive and acquired knowledge about computer viruses: a mixed methods study [J].
Brom, Cyril ;
Hannemann, Tereza ;
Tetourova, Tereza ;
Drobna, Anna ;
Kopankova, Nikol ;
Volna, Kristina ;
Kacerovska, Katerina ;
Dechterenko, Filip ;
Jezek, Pavel ;
Starkova, Tereza .
INTERNATIONAL JOURNAL OF TECHNOLOGY AND DESIGN EDUCATION, 2024, 34 (03) :903-938
[47]   Global asymptotic stability of some epidemiological models for computer viruses and malware using nonlinear cascade systems [J].
Manh Tuan Hoang .
Boletín de la Sociedad Matemática Mexicana, 2022, 28
[48]   A fractional-order model for computer viruses and some solution associated with residual power series method [J].
Al-Jarrah, A. ;
Alquran, M. ;
Freihat, A. ;
Al-Omari, S. ;
Nonlaopon, K. .
APPLIED MATHEMATICS IN SCIENCE AND ENGINEERING, 2023, 31 (01)
[49]   Computer-Aided vaccine design for selected positive-sense single stranded RNA viruses [J].
Pandian, Chitra Jeyaraj ;
Murugan, N. Arul ;
Rajendren, S. M. ;
Jeyaraman, Jeyakanthan .
INDIAN JOURNAL OF BIOCHEMISTRY & BIOPHYSICS, 2023, 60 (04) :281-296
[50]   Global asymptotic stability of some epidemiological models for computer viruses and malware using nonlinear cascade systems [J].
Manh Tuan Hoang .
BOLETIN DE LA SOCIEDAD MATEMATICA MEXICANA, 2022, 28 (02)