Open Problems in Computer Virology

In this article, we briefly review some of the most important open problems in computer virology, in three different areas: theoretical computer virology, virus propagation modeling and antiviral techniques. For each area, we briefly describe the open problems, we review the state of the art, and propose promising research directions.

[1]  Donald F. Towsley,et al.  Worm propagation modeling and analysis under dynamic quarantine defense , 2003, WORM '03.

[2]  Leonard M. Adleman,et al.  An Abstract Theory of Computer Viruses , 1988, CRYPTO.

[3]  Steve R. White,et al.  An Undetectable Computer Virus , 2000 .

[4]  Herbert W. Hethcote,et al.  The Mathematics of Infectious Diseases , 2000, SIAM Rev..

[5]  Mika Hirvensalo,et al.  Introduction to Evolutionary Computing , 2002, Natural Computing Series.

[6]  Kevin A. Kwiat,et al.  Modeling the spread of active worms , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[7]  William M. Spears,et al.  A unified prediction of computer virus spread in connected networks , 2002 .

[8]  David Moore,et al.  Internet quarantine: requirements for containing self-propagating code , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[9]  Michael T. Goodrich,et al.  Parallel algorithms column 1: models of computation , 1993, SIGA.

[10]  Michael Bailey,et al.  Shining Light on Dark Address Space , 2001 .

[11]  Richard Ford,et al.  Suppressing the Spread of Email Malcode using Short-term Message Recall , 2005, Journal in Computer Virology.

[12]  David Moore,et al.  Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.

[13]  Weibo Gong,et al.  Email Virus Propagation Modeling and Analysis , 2003 .

[14]  A. One,et al.  Smashing The Stack For Fun And Profit , 1996 .

[15]  Mingtian Zhou,et al.  Some Further Theoretical Results about Computer Viruses , 2004, Comput. J..

[16]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[17]  Y. Radai Checksumming Techniques for Anti-Viral Purposes , 1992, IFIP Congress.

[18]  Mika Hirvensalo Quantum computing, Second Edition , 2004, Natural computing series.

[19]  Jeffrey O. Kephart,et al.  Directed-graph epidemiological models of computer viruses , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[20]  Donald F. Towsley,et al.  Monitoring and early warning for internet worms , 2003, CCS '03.

[21]  Eric Chien,et al.  BLENDED ATTACKS EXPLOITS, VULNERABILITIES AND BUFFER-OVERFLOW TECHNIQUES IN COMPUTER VIRUSES , 2002 .

[22]  Matthew C. Elder,et al.  On computer viral infection and the effect of immunization , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).

[23]  A. Kohn [Computer viruses]. , 1989, Harefuah.

[24]  Ingo Wegener,et al.  Complexity Theory , 2005 .

[25]  Giuseppe Serazzi,et al.  Computer Virus Propagation Models , 2003, MASCOTS Tutorials.

[26]  Andrew Walenstein,et al.  Malware phylogeny generation using permutations of code , 2005, Journal in Computer Virology.

[27]  Vern Paxson,et al.  How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.

[28]  Neil D. Jones,et al.  Computability and complexity - from a programming perspective , 1997, Foundations of computing series.

[29]  Jr. Hartley Rogers Theory of Recursive Functions and Effective Computability , 1969 .

[30]  F. MacWilliams,et al.  The Theory of Error-Correcting Codes , 1977 .

[31]  John F. Morar,et al.  An environment for controlled worm replication and analysis , 2000 .

[32]  Eric Allender,et al.  Complexity Theory , 1997, Encyclopedia of Cryptography and Security.

[33]  Steve R. White,et al.  Open Problems in Computer Virus Research , 1998 .

[34]  Éric Filiol Computer Viruses: from Theory to Applications , 2005 .

[35]  Daniel Reynaud-Plantey New threats of Java viruses , 2005, Journal in Computer Virology.

[36]  Guillaume Bonfante,et al.  Toward an Abstract Computer Virology , 2005, ICTAC.

[37]  Cynthia A. Phillips,et al.  Constructing Computer Virus Phylogenies , 1996, CPM.

[38]  Zhi-hong Zuo,et al.  On the time complexity of computer viruses , 2005, IEEE Transactions on Information Theory.

[39]  Donald F. Towsley,et al.  Code red worm propagation modeling and analysis , 2002, CCS '02.

[40]  Klaus Brunnstein From AntiVirus to AntiMalware Software and Beyond: Another Approach to the Protection of Customers from Dysfunctional System Behaviour , 1999 .

[41]  Diomidis Spinellis,et al.  Reliable identification of bounded-length viruses is NP-complete , 2003, IEEE Trans. Inf. Theory.

[42]  Jun Xu,et al.  WORM vs. WORM: preliminary study of an active counter-attack mechanism , 2004, WORM '04.

[43]  Guillaume Bonfante,et al.  On Abstract Computer Virology from a Recursion Theoretic Perspective , 2006, Journal in Computer Virology.

[44]  Eugene H. Spafford,et al.  Crisis and aftermath , 1989, Commun. ACM.