Hunting Distributed Malware with the κ-Calculus
نویسندگان
چکیده
The defense of computer systems from malicious software attacks, such as viruses and worms, is a key aspect of computer security. The analogy between malicious software and biological infections suggested us to use the κcalculus, a formalism originally developed for the analysis of biological systems, for the formalization and analysis of malicious software. By modeling the different actors involved in a malicious code attack in the κ-calculus and by simulating their behavior, it is possible to extract important information that can drive in the choice of the defense technique to apply.
منابع مشابه
Hunting for Pirated Software Using Metamorphic Analysis
Hunting for Pirated Software Using Metamorphic Analysis by Hardikkumar Rana In this paper, we consider the problem of detecting software that has been pirated and modified. We analyze a variety of detection techniques that have been previously studied in the context of malware detection. For each technique, we empirically determine the detection rate as a function of the degree of modification ...
متن کاملFormalization of malware through process calculi
Since the seminal work from F. Cohen in the eighties, abstract virology has seen the apparition of successive viral models, all based on Turing-equivalent formalisms. But considering recent malware such as rootkits or k-ary codes, these viral models only partially cover these evolved threats. The problem is that Turing-equivalent models do not support interactive computations. New models have t...
متن کاملThe Bicovariant Differential Calculus on the Κ-poincaré Group and on the Κ-minkowski Space
The bicovariant differential calculus on the four-dimensional κ-Poincaré group and the corresponding Lie-algebra like structure are described. The differential calculus on the n-dimensional κ-Minkowski space covariant under the action of the κ-Poincaré group is constructed.
متن کاملExpressivity in the κ family
In this paper we study implementation of κ calculus into nanoκ calculus – called selfassembling of κ in nk. The former is a model for molecular biology that rewrites graphs of molecules in one step; the latter is a calculus similar to κ that only admits binary interactions. We give a solution of the self-assembling of κ in nanoκ that is divergent and we show the nonexistence of deterministic so...
متن کاملDyVSoR: dynamic malware detection based on extracting patterns from value sets of registers
To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In t...
متن کامل