Abstract
The theory of computer viruses has been studied by several authors, though there is no systematic theoretical study up to now. The long time open question in this area is as follows: Is it possible to design a signature-free (including dynamic signatures which we will define late) virus? In this paper, we give an affirmative answer to this question from a theoretical viewpoint. We will introduce a new stronger concept: dynamic signatures of viruses, and present a method to design viruses which are static signature-free and whose dynamic signatures are hard to determine unless some cryptographic assumption fails. We should remark that our results are only for theoretical interest and may be resource intensive in practice.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35515-3_53
Chapter PDF
Similar content being viewed by others
References
M. Abadi and J. Feigenbaum. Secure circuit evaluation. Journal of Cryptology, 2 (1): 1–12, 1990.
P. Denning. Computer viruses. American Scientist, Vol 76, 1988.
J. Hoperoft and J. Ullman. Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, 1979.
A. Menezes, P. van Oorschot, and S. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996.
W. Polk and L.Bassham. A guide to the selection of anti-virus techniques. National Institute of Standards and Technology, Computer Security Division, 1992.
T. Sander and C. Tschudin. Towards mobile cryptography. In:Proc. of the 1998 IEEE Symposium on Security and Privacy, 1998.
F. Skulason. The mutation engine — the final nail? Virus Bulletin, pp. 11–12, April, 1992.
K. Thompson. Reflections on trusting trust. Commun. ACM, 27 (8): 761–763, 1984.
J. Wack and L. Carnahan. Computer viruses and related threats: a management guide. NIST Special Publication 500–166, 1989.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 IFIP International Federation for Information Processing
About this paper
Cite this paper
Wang, Y. (2000). Using Mobile Agent Results to Create Hard-to-Detect Computer Viruses. In: Qing, S., Eloff, J.H.P. (eds) Information Security for Global Information Infrastructures. SEC 2000. IFIP — The International Federation for Information Processing, vol 47. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35515-3_17
Download citation
DOI: https://doi.org/10.1007/978-0-387-35515-3_17
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-5479-7
Online ISBN: 978-0-387-35515-3
eBook Packages: Springer Book Archive