Skip to main content

Abstract

The term computer virus was first used in 1984 and is now well known to the general public. Computers are increasingly pervasive in the workplace and in homes. Most users of the Internet, and more generally any network, have faced the malware risk at least once. However, it appears that in practice, users’ knowledge (in the broadest sense of the term) with respect to computer virology is still contains so flawed that the risk is increased instead of being reduced. The term virus itself is improperly used to designate a more general class of programs that have nothing to do with viruses: worms, Trojans, logic bombs, lures, etc. Viruses, in addition, cover a reality farmore complex. Many sub-categories exist, and many viral techniques relate to them, all involving different risks, which must be known for protection and an effective fight.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 349.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 449.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 599.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. Kraus: Selbstreproduktion bei Programmen, Diploma Thesis (Universität Dortmund, Dortmund 1980), english translation (published by D. Bilar, E. Filiol): On Selfreproducing Programs, J. Comput. Virol. 5(1), 9–87 (2009)

    Google Scholar 

  2. F. Cohen: Computer viruses, Ph.D. Thesis (University of Southern California, Los Angeles, USA 1986)

    Google Scholar 

  3. L.M. Adleman: An abstract theory of computer viruses. In: Advances in Cryptology – CRYPTO’88 (Springer, Berlin 1988) pp. 354–374

    Google Scholar 

  4. E. Filiol: L’ingénierie sociale, Linux Mag. 42, 30–35 (2002)

    Google Scholar 

  5. J. von Neumann: Theory of Self-Reproducing Automata, ed. by A.W. Burks (University of Illinois Press, Urbana 1966)

    Google Scholar 

  6. E. Filiol: Computer Viruses: From Theory to Applications, IRIS International Series, 2nd edn. (Springer, Paris, France 2009)

    Google Scholar 

  7. E. Filiol: Analyse du macro-ver OpenOffice/BadBunny, MISC Le journal de la sécuritéinformatique 34, 18–20 (2007)

    Google Scholar 

  8. A. Blonce, E. Filiol, L. Frayssignes: portable document format (PDF) security analysis and malware threats, Black Hat Europe 2008 Conference, Amsterdam, www.blackhat.com/archives (2008)

  9. D. Moore: The spread of the Code-Red worm (CRv2) http://www.caida.org/analysis/security/code-red/coderedv2_analysis.xml (2001)

  10. A. Ondi, R. Ford: How good is good enough? Metrics for worm/anti-worm evaluation, J. Comput. Virol. 3(2), 93–101 (2007)

    Article  Google Scholar 

  11. E. Filiol, E. Franc, A. Gubbioli, B. Moquet, G. Roblot: Combinatorial optimisation of worm propagation on an unknown network, Int. J. Comput. Sci. 2(2), 124–130 (2007)

    Google Scholar 

  12. E. Filiol: Techniques virales avancées, Collection IRIS (Springer, Paris, France 2007), English translation due October 2009

    Google Scholar 

  13. Y. Dodge: Premiers pas en statistiques (Springer, Paris, France 2005)

    Google Scholar 

  14. J. Hruska: (2002) Computer virus prevention: a primer, http://www.sophos.com/virusinfo/whitepapers/prevention.html

  15. Recommendation 600/DISSI/SCSSI, Protection des informations sensibles ne relevant pas du secret de Défense, Recommendation pour les postes de travail informatiques (Délégation Interministérielle pour la Sécuritédes Systèmes d’Information, March 1993)

    Google Scholar 

  16. A. Foucal, T. Martineau: Application concrète d’une politique antivirus, MISC Le journal de la sécuritéinformatique 5, 36–40 (2003)

    Google Scholar 

  17. M. Brassier: Mise en place d’une cellule de veille technologique, MISC Le journal de la sécuritéinformatique 5, 6–11 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Filiol, E. (2010). Viruses and Malware. In: Stavroulakis, P., Stamp, M. (eds) Handbook of Information and Communication Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04117-4_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04117-4_34

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04116-7

  • Online ISBN: 978-3-642-04117-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics