In this thesis we describe novel approaches to the formal description of systems which reproduce, and show that the resulting models have explanatory power and practical applications, particularly in the domain of computer virology. We start by generating a formal description of computer viruses based on formal methods and notations developed for software engineering. We then prove that our model can be used to detect metamorphic computer viruses, which are designed specifically to avoid well-established signature-based detection methods. Next, we move away from the specific case of reproducing programs, and consider formal models of reproducing things in general. We show that we can develop formal models of the ecology of a reproducer, bas...
Epidemic dynamics of computer viruses is an emerging discipline aiming to understand the way that co...
We analyze real data sets from two e-mail viruses, the Magistr.b and the Sircam.a to explore how we ...
Computer viruses are an important risk to computational systems endangering either corporations of a...
There has been considerable interest in computer viruses since they first appeared in 1981, and espe...
This dissertation tackles three topics: the formalization of the computer virology, the construction...
There has been considerable interest in computer viruses since they first appeared in 1981, and espe...
Cette thèse aborde trois thèmes : la formalisation de la virologie informatique, l'élaboration de pr...
This paper reviews self-replication in the context of (partial) recursive functions and Turing compu...
This paper presents a general overview on computer viruses and defensive techniques. Computer virus ...
In recent years, different computing models have emerged within the area of Unconven-tional Computat...
International audienceSelf-replication is one of the fundamental aspects of computing where a progra...
There has been considerable interest in computer viruses since they first appeared in 1981, and espe...
An implicit aim in cellular infection biology is to understand the mechanisms how viruses, microbes,...
Abstract. We study computer virology from an abstract point of view. Viruses and worms are self-repl...
We are concerned with theoretical aspects of computer viruses. For this, we suggest a new definition...
Epidemic dynamics of computer viruses is an emerging discipline aiming to understand the way that co...
We analyze real data sets from two e-mail viruses, the Magistr.b and the Sircam.a to explore how we ...
Computer viruses are an important risk to computational systems endangering either corporations of a...
There has been considerable interest in computer viruses since they first appeared in 1981, and espe...
This dissertation tackles three topics: the formalization of the computer virology, the construction...
There has been considerable interest in computer viruses since they first appeared in 1981, and espe...
Cette thèse aborde trois thèmes : la formalisation de la virologie informatique, l'élaboration de pr...
This paper reviews self-replication in the context of (partial) recursive functions and Turing compu...
This paper presents a general overview on computer viruses and defensive techniques. Computer virus ...
In recent years, different computing models have emerged within the area of Unconven-tional Computat...
International audienceSelf-replication is one of the fundamental aspects of computing where a progra...
There has been considerable interest in computer viruses since they first appeared in 1981, and espe...
An implicit aim in cellular infection biology is to understand the mechanisms how viruses, microbes,...
Abstract. We study computer virology from an abstract point of view. Viruses and worms are self-repl...
We are concerned with theoretical aspects of computer viruses. For this, we suggest a new definition...
Epidemic dynamics of computer viruses is an emerging discipline aiming to understand the way that co...
We analyze real data sets from two e-mail viruses, the Magistr.b and the Sircam.a to explore how we ...
Computer viruses are an important risk to computational systems endangering either corporations of a...