Reliable identification of bounded-length viruses is NP-complete

被引:49
|
作者
Spinellis, D [1 ]
机构
[1] Athens Univ Econ & Business, Dept Management Sci & Technol, GR-10434 Athens, Greece
关键词
buffer overflow; complexity; detection; identification; mutation; NP-complete; security; virus;
D O I
10.1109/TIT.2002.806137
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A virus is a program that replicates itself by copying its code into other files. A common virus-protection mechanism involves scanning files to detect code patterns of known viruses. We prove that the problem of reliably identifying a bounded-length mutating virus is NP-complete by showing that a virus detector for a certain virus strain can be used to solve the satisfiability problem. The implication of this result is that virus identification methods will be facing increasing strain as virus mutation and hosting strategies mature, and that different protection methods should be developed and employed.
引用
收藏
页码:280 / 284
页数:5
相关论文
共 50 条
  • [31] Maximizing edge-ratio is NP-complete
    Noble, Steven D.
    Hansen, Pierre
    Mladenovic, Nenad
    DISCRETE APPLIED MATHEMATICS, 2011, 159 (18) : 2276 - 2280
  • [32] Revising Distributed UNITY Programs Is NP-Complete
    Bonakdarpour, Borzoo
    Kulkarni, Sandeep S.
    PRINCIPLES OF DISTRIBUTED SYSTEMS, 12TH INTERNATIONAL CONFERENCE, OPODIS 2008, 2008, 5401 : 408 - 427
  • [33] NP-COMPLETE NUMBER-THEORETIC PROBLEM
    GURARI, EM
    IBARRA, OH
    JOURNAL OF THE ACM, 1979, 26 (03) : 567 - 581
  • [34] Protocol insecurity with a finite number of sessions and composed keys is NP-complete
    Rusinowitch, M
    Turuani, M
    THEORETICAL COMPUTER SCIENCE, 2003, 299 (1-3) : 451 - 475
  • [35] Automatically Solving NP-Complete Problems on a Quantum Computer
    Hu, Shaohan
    Liu, Peng
    Chen, Chun-Fu
    Pistoia, Marco
    PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING - COMPANION (ICSE-COMPANION, 2018, : 258 - 259
  • [36] APPROXIMATION ALGORITHMS FOR NP-COMPLETE PROBLEMS ON PLANAR GRAPHS
    BAKER, BS
    JOURNAL OF THE ACM, 1994, 41 (01) : 153 - 180
  • [37] Resilient Delegation Revocation with Precedence for Predecessors is NP-Complete
    Cramer, Marcos
    Van Hertum, Pieter
    Lapauw, Ruben
    Dasseville, Ingmar
    Denecker, Marc
    2016 IEEE 29TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2016), 2016, : 432 - 442
  • [38] Sublinear P system solutions to NP-complete problems
    Dinneen, Michael J.
    Henderson, Alec
    Nicolescu, Radu
    THEORETICAL COMPUTER SCIENCE, 2023, 958
  • [39] Recognizing Union-Find trees is NP-complete
    Gelle, Kitti
    Ivan, Szabolcs
    INFORMATION PROCESSING LETTERS, 2018, 131 : 7 - 14
  • [40] Moon-or-Sun, Nagareru, and Nurimeizu are NP-complete
    Iwamoto, Chuzo
    Ide, Tatsuya
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2022, E105 (08)