Abstract
In this article, we briefly review some of the most important open problems in computer virology, in three different areas: theoretical computer virology, virus propagation modeling and antiviral techniques. For each area, we briefly describe the open problems, we review the state of the art, and propose promising research directions.
Similar content being viewed by others
References
Cohen, F.: Computer Viruses. PhD Thesis, University of Southern California (1985)
Adleman, L.M.: An abstract theory of computer viruses. In: Goldwasser, S. (ed.) Advances in cryptology – CRYPTO’88 – Lecture notes in computer science, vol. 403, pp. 354–374, Berlin Heidelberg New York: Springer 1988
Zuo Z., Zhou M. (2004). Some further theoretical results about computer viruses. Comput J 47(6):627–633
Bonfante G., Kaczmarek M., Marion J.-Y. (2006). On abstract computer virology from a recursion-theoretic perspective. J Comput Virol 1(3–4):45–54
Bonfante, G., Kaczmarek, M., Marion, J.-Y.: Toward an abstract computer virology. In: Proceedings of the ICTAC’05, lecture notes in computer science, vol. 3722, pp. 579–593. Berlin Heidelberg New York: Springer 2002, 41p (2005)
Rogers, H.: Theory of recursive functions and effective computability. McGraw Hill 1967
Spinellis D. (2003). Reliable identification of bounded-length viruses is np-complete. IEEE Trans Inf Theory 49(1):280–284
Papadimitriou C.H. (1994). Complexity theory. Addison Wesley, Reading
Filiol E. (2005). Computer viruses: from theory to applications, 1st edn. Springer, Berlin Heidelberg New York
Zuo Z., Zhou M. (2003). On the time complexity of computer viruses. IEEE Trans Inf Theo 51(8):2962–2966
Chess, D.M., White, S.R.: An undetectable computer virus. In: Proceedings of the virus bulletin conference (2000)
Filiol E. (2006). Advanced viral techniques: mathematical and algorithmic aspects. Springer, Berlin Heidelberg New York
Jones N.D. (1997). Computability and complexity: from a programming perspective. MIT, Cambridge
MacWilliams F.J., Sloane N.J.A. (1977). The theory of error-correcting codes. North-Holland, Amsterdam
Hirvensalo M. (2004). Quantum computing, 2nd edn. Springer, Berlin HEidelberg New York
Brassard G. (1993). A bibliography of quantum cryptography. SIGACT News 24(3):16–20
Shor, P.W.: Algorithms for quantum computation: Discrete logarithms and factoring. In: Proceedings of the 35th annual symposium on foundations of computer science. Los Alamitos: IEEE Comput Soceity Press (1994)
Staniford, S., Paxson, V., Weaver, N.: How to own the internet in your spare time. In: Proceedings of the 11th USENIX security symposium (Security ’02), (2002)
Whalley, I., Arnold, B., Chess, D., Morar, J., Segal, A., Swimmer, M.: An environment for controlled worm replication and analysis. In: Proceedings of the virus bulletin conference (2000)
White, S.R.: Open problems in computer virus research. In: Proceedings of the virus bulletin conference (1998)
Kephart, J.O., White, S.R.: Directed-graph epidemiological models of computer viruses. In: IEEE symposium on security and privacy, pp 343–361 (1991)
Hethcote H.W. (2000). The mathematics of infectious diseases. SIAM Rev 42(4):599–653
Billings L., Spears W.M., Schwartz I.B. (2002). A unified prediction of computer virus spread in connected networks. Phys Lett A 297:261–266
Zou C.C., Towsley D., Gong W.: Email virus propagation modeling and analysis. Technical report TR-CSE-03-04, University of Massachussets, Amherst
Spafford E.H. (1989). Crisis and aftermath. Commun ACM 32(6):678–687
Permeh, R., Hassell, R.: Microsoft I.I.S. remote buffer overflow. Advisory AD20010618 (2001)
Aleph1’ Levy E. Smashing the stack for fun and profit. Phrack Magazine 7(49) (1996).
Labovitz, A.A.C., Bailey, M.: Shining light on dark address space. Technical report, Arbor networks (2001)
Moore, D.: Network telescopes: Observing small or distant security events. In: Proceedings of the 11th USENIX security symposium (2002)
Moore, D., Shannon, C., Brown, J.: Code-red: a case study on the spread and victims of an internet worm. In: Proceedings of the ACM SIGCOMM/USENIX internet measurement workshop (2002)
Serazzi, G., Zanero, S.: Computer virus propagation models. In: Calzarossa, M.C., Gelenbe, E. (eds.) Tutorials of the 11th IEEE/ACM Int’l symp. on modeling, analysis and simulation of computer and telecom – systems - MASCOTS 2003. Berlin Heidelberg New York: Springer 2003
Zou, C.C., Gong, W., Towsley, D.: Code red worm propagation modeling and analysis. In: Proceedings of the 9th ACM conference on computer and communications security, pp 138–147. New York: ACM Press 2002
Wang, C., Knight, J.C., Elder, M.C.: On computer viral infection and the effect of immunization. In: ACSAC ’00: proceedings of the 16th annual computer security applications conference, Washington, DC, USA, p 246. Dublin: IEEE Computer Society (2000)
Chen, Z., Gao, L., Kwiat, K.: Modeling the spread of active worms. In: Proceedings of IEEE INFOCOM 2003 (2003)
El-FarArun I.K., Ford R., Ondi A., Pancholi M. (2005). Suppressing the spread of email malcode using short-term message recall. J Comput Virol 1(1–2):4–12
Zou, C.C., Gao, L., Gong, W., Towsley, D.: Monitoring and early warning for internet worms. In: Proceedings of the 10th ACM conference on computer and communication security, pp 190–199. New York: ACM Press 2003
Chien, E., Peter, S.: Blended attacks: Exploits, vulnerabilities and buffer-overflow techniques in computer viruses. In: Proceedings of virus bulletin conference 2002, pp 1–35 Oxfordshire: Virus Bulletin Ltd (2002)
Helenius, M.: Realisation ideas for secure system design. In: Gattiker, U.E. (ed.) EICAR Conference Best Paper Proceedings, Copenhagen (2003)
Yisrael, R. Checksumming techniques for anti-viral purposes. In: Proceedings of 1st international virus bulletin conference (1991)
Yisrael, R.: Integrity checking for anti-viral purposes: theory and practice. improved version of earlier conference paper http://www.virusbtn.com/OtherPapers/Integrity/integrity-ps.zip (1994)
Bontchev, V. Possible virus attacks against integrity programs and how to prevent them. In: Proceedings of 2nd international virus bulletin conference, pp 131–141 (1992)
Zou, C.C., Gong, W., Towsley, D.: Worm propagation modeling and analysis under dynamic quarantine defense. In: Proceedings of the ACM CCS workshop on rapid malcode (WORM’03) (2003)
Moore, D., Shannon, C., Voelker, G.M., Savage, S.: Internet quarantine: requirements for containing self-propagating code. In: Proceedings of IEEE INFOCOM (2003)
Castaneda, F., Sezer, E.C., Xu, J.: Worm vs. worm: preliminary study of an active counter-attack mechanism. In: WORM ’04: Proceedings of the 2004 ACM workshop on Rapid malcode, pp 83–93. New York: ACM Press, 2004
Brunnstein, K.: From antivirus to antimalware software and beyond: another approach to the protection of customers from dysfunctional system behaviour. In: Proceedings of 22nd national information systems security conference, 1999
Goldberg L.A., Goldberg P.W., Phillips C.A., Sorkin G.B. (1998). Constructing computer virus phylogenies. J Algorithms 26:188–208
Karim M.E., Walenstein A., Lakhotia A. (2005). Malware phylogeny generation using permutations of code. J Comput Virol 1(1–2):13–23
Jarmo, N.:What makes symbian malware tick. In: Proceedings of virus bulletin conference, pp 115–120. England: Virus Bulletin Ltd 2005
Reynaud-Plantey D. (2005). New threats of java viruses. J Comput Virol 1(3–4):32–43
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Filiol, E., Helenius, M. & Zanero, S. Open Problems in Computer Virology. J Comput Virol 1, 55–66 (2006). https://doi.org/10.1007/s11416-005-0008-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11416-005-0008-3