1 research outputs found

    Formalization of malware through process calculi

    No full text
    Considering malware, a recent article underlines the fact that interactions with the execution environment, concurrency and also non-termination prove to be important computation functionalities [3]. In effect, malware, being resilient and adaptive by nature, intensively use these functionalities to survive and infect new systems. Looking at the theoretical models existing in abstract virology, they mainly focus on the selfreplication capacity which is defined in a purely functional way [4],[5, Chpt.2-3],[6]. Unfortunately, these models rely on Turing-equivalent formalisms which can hardly support interactive computations. With the apparition of interaction-based viral techniques, new models have thus been introduced to cope with this drawback, but loosing the unified approach in the way. The apparition of k-ary malware is an obvious example. In effect, these malware heavily rely on concurrency by a distribution of the malicious code over several executing parts. A new model based on Boolean functions has been provided to model their evolving interdependence over time [7]. A second relevant example is the apparition of reactive nonterminating techniques such as stealth currently deployed in rootkits. Different models have been provided to cover stealth based either on steganography [8] or graph theory [9]. According to [3], by evolving towards interactiondedicated formalisms such as process calculi, a unified, reference model for malware could be defined to suparXiv:0902.0469v
    corecore