Abstract
The defense of computer systems from malicious software attacks, such as viruses and worms, is a key aspect of computer security. The analogy between malicious software and biological infections suggested us to use the κ-calculus, a formalism originally developed for the analysis of biological systems, for the formalization and analysis of malicious software. By modeling the different actors involved in a malicious code attack in the κ-calculus and by simulating their behavior, it is possible to extract important information that can drive in the choice of the defense technique to apply.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Adleman, L.M.: An abstract theory of computer viruses. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 354–374. Springer, Heidelberg (1990)
Bächer, P., Holz, T., Kötter, M., Wicherski, G.: Know your enemy: Tracking botnet, http://www.honeynet.org/papers/bots
Bergstra, J.A., Klop, J.W.: Process algebra for synchronous communication. Information and Control 60(1-3), 109–137 (1984)
Bonfante, G., Kaczmarek, M., Marion, J.: On abstract computer virology from a recursion theoretic perspective. Journal in Computer Virology 1(3-4), 45–54 (2006)
Cardelli, L.: Brane calculi. In: Danos, V., Schachter, V. (eds.) CMSB 2004. LNCS (LNBI), vol. 3082, pp. 257–278. Springer, Heidelberg (2005)
Cardelli, L., Gordon, A.D.: Mobile ambients. TCS 240(1), 177–213 (2000)
Cohen, F.: Computer viruses: Theory and experiments. Computers and Security 6, 22–35 (1987)
Collection of kappa tools, http://kappalanguage.org/tools
Cooke, E., Jahanian, F., McPherson, D.: The zombie roundup: Understanding, detecting, and disrupting botnets. In: SRUTI 2005, pp. 39–44 (2005)
Dagon, D., Gu, G., Lee, C.P.: A taxonomy of botnet structures. In: Botnet Detection. Advances in Information Security, vol. 36, pp. 143–164. Springer, Heidelberg (2008)
Dagon, D., Zou, C.C., Lee, W.: Modeling botnet propagation using time zones. In: NDSS. The Internet Society (2006)
Danos, V., Laneve, C.: Formal molecular biology. TCS 325(1), 69–110 (2004)
Delzanno, G., Di Giusto, C., Gabbrielli, M., Laneve, C., Zavattaro, G.: The κ-lattice: Decidability boundaries for qualitative analysis in biological languages. In: Degano, P., Gorrieri, R. (eds.) CMSB 2009. LNCS, vol. 5688, pp. 158–172. Springer, Heidelberg (2009)
Filiol, E.: Formalisation and implementation aspects of k-ary (malicious) codes. Journal in Computer Virology 3(2), 75–86 (2007)
Ganesh, A.J., Massoulié, L., Towsley, D.F.: The effect of network topology on the spread of epidemics. In: INFOCOM, pp. 1455–1466. IEEE, Los Alamitos (2005)
Grimes, R.A.: Malicious mobile code: Virus protection for windows. O’Reilly & Associates, Inc., Sebastopol (2001)
Jacob, G., Filiol, E., Debar, H.: Formalization of viruses and malware through process algebras. In: ARES 2010, pp. 597–602. IEEE Computer Society, Los Alamitos (2010)
Kephart, J.O., White, S.R.: Directed-graph epidemiological models of computer viruses. In: IEEE Symposium on Security and Privacy, pp. 343–361 (1991)
Kim, J., Radhakrishnan, S., Dhall, S.K.: Measurement and analysis of worm propagation on internet network topology. In: ICCCN, pp. 495–500. IEEE, Los Alamitos (2004)
McCarty, B.: Botnets: Big and bigger. IEEE Security and Privacy 1, 87–90 (2003)
McGraw, G., Morrisett, G.: Attacking malicious code: Report to the Infosec resarch council. IEEE Software 17(5), 33–41 (2000)
Milner, R.: Communication and concurrency. Prentice Hall International, Englewood Cliffs (1989)
Prakash, B.A., Tong, H., Valler, N., Faloutsos, M., Faloutsos, C.: Virus propagation on time-varying networks: Theory and immunization algorithms. In: Balcázar, J.L., Bonchi, F., Gionis, A., Sebag, M. (eds.) ECML PKDD 2010. LNCS, vol. 6323, pp. 99–114. Springer, Heidelberg (2010)
Sangiorgi, D., Walker, D.: PI-Calculus: A Theory of Mobile Processes. Cambridge University Press, Cambridge (2001)
Wang, Q., Chen, Z., Chen, C., Pissinou, N.: On the robustness of the botnet topology formed by worm infection. In: GLOBECOM, pp. 1–6. IEEE, Los Alamitos (2010)
Zuo, Z., Zhou, M.: Some further theoretical results about computer viruses. Computer Journal 47(6), 627–633 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dalla Preda, M., Di Giusto, C. (2011). Hunting Distributed Malware with the κ-Calculus. In: Owe, O., Steffen, M., Telle, J.A. (eds) Fundamentals of Computation Theory. FCT 2011. Lecture Notes in Computer Science, vol 6914. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22953-4_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-22953-4_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22952-7
Online ISBN: 978-3-642-22953-4
eBook Packages: Computer ScienceComputer Science (R0)