A Framework for Modelling Trojans and Computer Virus Infection

It is not possible to view a computer operating in the real world, including the possibility of Trojan horse programs and computer viruses, as simply a finite realisation of a Turing machine. We consider the actions of Trojan horses and viruses in real computer systems and suggest a minimal framework for an adequate formal understanding of the phenomena. Some conventional approaches, including biological metaphors, are shown to be inadequate; some suggestions are made towards constructing virally-resistant systems.

[1]  Peter Henderson Functional Programming , 1980 .

[2]  Richard Rhodes,et al.  Chain mail , 1994, Nature.

[3]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[4]  A. Fleischmann Distributed Systems , 1994, Springer Berlin Heidelberg.

[5]  Eugene H. Spafford,et al.  Computer Viruses as Artificial Life , 1994, Artificial Life.

[6]  Richard Dawkins,et al.  The 'St Jude' mind virus , 1994, Nature.

[7]  Peter Schrag,et al.  Mind Control , 1978 .

[8]  Chris Langton,et al.  Artificial Life , 2017, Encyclopedia of Machine Learning and Data Mining.

[9]  Richard J. Lipton,et al.  New Directions In Testing , 1989, Distributed Computing And Cryptography.

[10]  Vesselin Bontchev Macro virus identification problems , 1998, Comput. Secur..

[11]  Harold W. Thimbleby,et al.  Liveware: A New Approach to Sharing Data in Social Networks , 1991, Int. J. Man Mach. Stud..

[12]  Steve R. White,et al.  Fighting Computer Viruses , 1997 .

[13]  Harold W. Thimbleby,et al.  Optimising Self-Replicating Programs , 1987, Comput. J..

[14]  Carolyn P. Meinel How Hackers Break In. . . and how they are Caught , 1998 .

[15]  R. Lewontin ‘The Selfish Gene’ , 1977, Nature.

[16]  H. Jane Brockmann,et al.  The selfish gene (2nd edn) , 1990 .

[17]  David Ferbrache,et al.  A pathology of computer viruses , 1991 .

[18]  Leonard M. Adleman,et al.  An Abstract Theory of Computer Viruses , 1988, CRYPTO.

[19]  Helen Meye,et al.  How hackers break in… and how they are caught , 1998 .

[20]  L. J. Hoffman Rogue programs: viruses, worms and Trojan horses , 1990 .

[21]  Marvin Minsky,et al.  Computation : finite and infinite machines , 2016 .

[22]  Kenneth Stevens Mind control , 1994, Nature.

[23]  Warren Bower New directions , 1937 .

[24]  Jeffrey M. Voas,et al.  A model for detecting the existence of software corruption in real time , 1993, Comput. Secur..

[25]  Maria M. Pozzo,et al.  An approach to containing computer viruses , 1987, Comput. Secur..

[26]  Philip Zimmermann,et al.  PGP source code and internals , 1995 .

[27]  Kimmo Kauranen,et al.  A note on Cohen's formal model for computer viruses , 1990, SGSC.

[28]  N. Beckage,et al.  The parasitic wasp's secret weapon , 1997 .

[29]  Frederick B. Cohen,et al.  A short course on computer viruses (2nd ed.) , 1994 .

[30]  A. Kohn [Computer viruses]. , 1989, Harefuah.

[31]  Harold W. Thimbleby Controversy corner : An organizational solution to piracy and viruses , 1994, J. Syst. Softw..

[32]  Peter Wegner,et al.  Why interaction is more powerful than algorithms , 1997, CACM.

[33]  W A GRAHAM,et al.  Pest Control , 1959, Nature.

[34]  Ralf Burger,et al.  Computer Viruses: A High-Tech Disease , 1988 .

[35]  Yasusi Kanada Web pages that reproduce themselves by JavaScript , 1997, SIGP.

[36]  J M Coffin,et al.  Virology. How does variation count? , 1992, Nature.

[37]  Harold W. Thimbleby,et al.  Comments on a paper by Voas, Payne and Cohen: 'A model for detecting the existence of software corruption in real time' , 1994, Comput. Secur..

[38]  Harold W. Thimbleby,et al.  Concepts of cooperation in artificial life , 1995, IEEE Trans. Syst. Man Cybern..

[39]  Maarten M. Fokkinga,et al.  Expressions That Talk About Themselves , 1996, Computer/law journal.

[40]  C. P. Meinel,et al.  HOW HACKERS BREAK IN... , 1998 .

[41]  C. Q. Lee,et al.  The Computer Journal , 1958, Nature.

[42]  Fred Cohen,et al.  Computational aspects of computer viruses , 1989, Comput. Secur..

[43]  John Race Using computer graphics to find interesting properties in data , 1990 .

[44]  James P Anderson,et al.  Computer Security Technology Planning Study , 1972 .

[45]  K. Thompson Reflections on trusting trust , 1984, CACM.

[46]  Clinton E. White,et al.  The IPM model of computer virus management , 1990, Comput. Secur..

[47]  Jeffrey D. Ullman,et al.  Introduction to Automata Theory, Languages and Computation , 1979 .

[48]  Alan M. Turing,et al.  Systems of Logic Based on Ordinals , 2012, Alan Turing's Systems of Logic.

[49]  Stephanie Forrest,et al.  Infect Recognize Destroy , 1996 .

[50]  David Ferbrache BSc A Pathology of Computer Viruses , 1992, Springer London.

[51]  Harold W. Thimbleby Can viruses ever be useful? , 1991, Comput. Secur..

[52]  Carey Nachenberg,et al.  Computer virus-antivirus coevolution , 1997, Commun. ACM.

[53]  I. Alger New Directions in , 1988 .