Formal definition of generalized virus and its identifying algorithm

被引:0
|
作者
He H.-J. [1 ]
Luo L. [1 ]
Dong L.-M. [2 ]
He X.-X. [1 ]
Hou F.-Y. [1 ]
Zhong G.-J. [1 ]
机构
[1] Computer Department, School of Computer, National University of Defense Technology
[2] Logistics Command Colleges
来源
关键词
Explicit virus; Hidden virus; Trojan horse; User's intention; Virus; Worm;
D O I
10.3724/SP.J.1016.2010.00562
中图分类号
学科分类号
摘要
The definition of malicious software is a hot in security domain. Malicious software includes virus, worm and Trojan horse. There is now only formal definition of virus, and no widely accepted formal definitions of worm and Trojan horse. According to definition of traditional virus, there is no algorithm to identify virus definitely. This paper proposes that whether a program code is virus is relative to user, and only those bringing damage to user are viruses. The paper distinguishes viruses to explicit virus and hidden virus based on user's intention, and presents a formal definition of explicit virus and its identifying algorithm. Both theoretical analysis and actual cases study indicates that traditional virus, most of worm, and Trojan horse are explicit viruses.
引用
收藏
页码:562 / 568
页数:6
相关论文
共 7 条
  • [1] Singh Prabhat K., Arun L., Analysis and detection of computer viruses and worms: An annotated bibliography, ACM SIGNPLAN Notices, 37, 2, pp. 29-35, (2002)
  • [2] Cohen F., Computer viruses-theory and experiments, Computers and Security, 6, 1, pp. 22-35, (1987)
  • [3] Chess David M., White Steve R., An undetectable computer virus, Proceedings of the Virus Bulletin Conference, (2000)
  • [4] Adleman L.M., An abstract theory of computer viruses, Advances in Cryptology, pp. 354-374, (1988)
  • [5] Cohen F., Computational aspects of computer viruses, Computers and Security, 8, 4, pp. 325-344, (1989)
  • [6] Cohen F., A Case for Benevolent Viruses, (1991)
  • [7] Vesselin B., Are 'Good' computer viruses still a bad idea?, Proceedings of the EICAR'94 Conference, pp. 25-47, (1994)