We are concerned with theoretical aspects of computer viruses. For this, we suggest a new definition of viruses which is clearly based on the iteration theorem and above all on Kleene's recursion theorem. We show that we capture in a natural way previous definitions, and in particular the one of Adleman. We establish generic constructions in order to construct viruses, and we illustrate them by various examples. We discuss about the relationship between information theory and virus and we propose a defense against some kind of viral propagation. Lastly, we show that virus detection is Π 02 -complete. However, since we are able to deal with system vulnerability, we exhibit another defense based on controlling system access
In order to understand the global virus spread, a system is either infected or not. If the system is...
Computer viruses are executable code programs that have a unique ability to replicate themselves in ...
International audienceNowadays viruses use polymorphic techniques to mutate their code on each repli...
We are concerned with theoretical aspects of computer viruses. For this, we suggest a new definition...
Abstract. We study computer virology from an abstract point of view. Viruses and worms are self-repl...
This dissertation tackles three topics: the formalization of the computer virology, the construction...
In recent years, different computing models have emerged within the area of Unconven-tional Computat...
Cette thèse aborde trois thèmes : la formalisation de la virologie informatique, l'élaboration de pr...
The threat of attack by computer viruses is in reality a very small part of a much more general thre...
There has been considerable interest in computer viruses since they first appeared in 1981, and espe...
Epidemic dynamics of computer viruses is an emerging discipline aiming to understand the way that co...
International audienceSelf-replication is one of the fundamental aspects of computing where a progra...
It is well known that there exist viruses whose set of infected programs is undecidable. If a virus ...
Computer viruses are the most pressing problem of many today. Computer virus remains one of the reas...
In this thesis we describe novel approaches to the formal description of systems which reproduce, an...
In order to understand the global virus spread, a system is either infected or not. If the system is...
Computer viruses are executable code programs that have a unique ability to replicate themselves in ...
International audienceNowadays viruses use polymorphic techniques to mutate their code on each repli...
We are concerned with theoretical aspects of computer viruses. For this, we suggest a new definition...
Abstract. We study computer virology from an abstract point of view. Viruses and worms are self-repl...
This dissertation tackles three topics: the formalization of the computer virology, the construction...
In recent years, different computing models have emerged within the area of Unconven-tional Computat...
Cette thèse aborde trois thèmes : la formalisation de la virologie informatique, l'élaboration de pr...
The threat of attack by computer viruses is in reality a very small part of a much more general thre...
There has been considerable interest in computer viruses since they first appeared in 1981, and espe...
Epidemic dynamics of computer viruses is an emerging discipline aiming to understand the way that co...
International audienceSelf-replication is one of the fundamental aspects of computing where a progra...
It is well known that there exist viruses whose set of infected programs is undecidable. If a virus ...
Computer viruses are the most pressing problem of many today. Computer virus remains one of the reas...
In this thesis we describe novel approaches to the formal description of systems which reproduce, an...
In order to understand the global virus spread, a system is either infected or not. If the system is...
Computer viruses are executable code programs that have a unique ability to replicate themselves in ...
International audienceNowadays viruses use polymorphic techniques to mutate their code on each repli...