On the time complexity of computer viruses

被引:25
|
作者
Zuo, ZH [1 ]
Zhu, QX [1 ]
Zhou, MT [1 ]
机构
[1] Univ Elect Sci & Technol China, Coll Comp Sci & Engn, Chengdu 610054, Peoples R China
关键词
computational complexity; computer viruses; detection; infection; time complexity;
D O I
10.1109/TIT.2005.851780
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computer viruses can disable computer systems not only by destroying data or modifying a system's configuration, but also by consuming most of the computing resources such as CPU time and storage. The latter effects are related to the computational complexity of computer viruses. In this correspondence, we investigate some issues concerning the time complexity of computer viruses, and prove some known experimental results mathematically. We prove that there exist computer viruses with arbitrarily long running time, not only in the infecting procedure but in the executing procedure. Moreover, we prove that there are computer viruses with arbitrarily large time complexity in the detecting procedure, and there are undecidable computer viruses that have no "minimal" detecting procedure.
引用
收藏
页码:2962 / 2966
页数:5
相关论文
共 50 条
  • [21] THE SCOURGE OF COMPUTER VIRUSES
    MARSHALL, E
    SCIENCE, 1988, 240 (4849) : 133 - 134
  • [22] COMPUTER VIRUSES - COMMENT
    DUMSHA, T
    JOURNAL OF THE AMERICAN DENTAL ASSOCIATION, 1992, 123 (11): : 12 - 12
  • [23] Fighting computer viruses
    Kephart, JO
    Sorkin, GB
    Chess, DM
    White, SR
    SCIENTIFIC AMERICAN, 1997, 277 (05) : 88 - 93
  • [24] SHAREWARE AND COMPUTER VIRUSES
    GREENBERG, RM
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 1990, 200 : 3 - CHAS
  • [25] COMPUTER VIRUSES - AN OVERVIEW
    MARMION, D
    LIBRARY SOFTWARE REVIEW, 1990, 9 (03): : 139 - 144
  • [26] A history of computer viruses: Three special viruses
    Highland, HJ
    COMPUTERS & SECURITY, 1997, 16 (05) : 430 - 438
  • [27] Computer communications complexity
    Steinke, Steve
    Network Magazine, 2002, 17 (10):
  • [28] COMPLEXITY OF COMPUTER ALGORITHMS
    LEACH, RJ
    ROCKY MOUNTAIN JOURNAL OF MATHEMATICS, 1987, 17 (01) : 167 - 187
  • [29] Computer viruses: officials and responsibility
    Chartrand, Alexandre
    REVUE GENERAL DE DROIT, 2009, 39 (01): : 261 - 263
  • [30] Research in computer viruses and worms
    Peng Guojun
    Zhang Huanguo
    Wang Lina
    CHINA COMMUNICATIONS, 2007, 4 (02) : 90 - 96