Hunting Distributed Malware with the κ-Calculus

نویسندگان

  • Mila Dalla Preda
  • Cinzia Di Giusto
چکیده

The defense of computer systems from malicious software attacks, such as viruses and worms, is a key aspect of computer security. The analogy between malicious software and biological infections suggested us to use the κcalculus, a formalism originally developed for the analysis of biological systems, for the formalization and analysis of malicious software. By modeling the different actors involved in a malicious code attack in the κ-calculus and by simulating their behavior, it is possible to extract important information that can drive in the choice of the defense technique to apply.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hunting for Pirated Software Using Metamorphic Analysis

Hunting for Pirated Software Using Metamorphic Analysis by Hardikkumar Rana In this paper, we consider the problem of detecting software that has been pirated and modified. We analyze a variety of detection techniques that have been previously studied in the context of malware detection. For each technique, we empirically determine the detection rate as a function of the degree of modification ...

متن کامل

Formalization of malware through process calculi

Since the seminal work from F. Cohen in the eighties, abstract virology has seen the apparition of successive viral models, all based on Turing-equivalent formalisms. But considering recent malware such as rootkits or k-ary codes, these viral models only partially cover these evolved threats. The problem is that Turing-equivalent models do not support interactive computations. New models have t...

متن کامل

The Bicovariant Differential Calculus on the Κ-poincaré Group and on the Κ-minkowski Space

The bicovariant differential calculus on the four-dimensional κ-Poincaré group and the corresponding Lie-algebra like structure are described. The differential calculus on the n-dimensional κ-Minkowski space covariant under the action of the κ-Poincaré group is constructed.

متن کامل

Expressivity in the κ family

In this paper we study implementation of κ calculus into nanoκ calculus – called selfassembling of κ in nk. The former is a model for molecular biology that rewrites graphs of molecules in one step; the latter is a calculus similar to κ that only admits binary interactions. We give a solution of the self-assembling of κ in nanoκ that is divergent and we show the nonexistence of deterministic so...

متن کامل

DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers

To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011