A Framework for Modelling Trojans and Computer Virus Infection

نویسندگان

  • Harold W. Thimbleby
  • Stuart Anderson
  • Paul A. Cairns
چکیده

It is not possible to view a computer operating in the real world, including the possibility of Trojan Horse programs and computer viruses, as simply a finite realisation of a Turing Machine. We consider the actions of Trojan Horses and viruses in real computer systems and suggest a minimal framework for an adequate formal understanding of the phenomena. Some conventional approaches, including biological metaphors, are shown to be inadequate; some suggestions are made towards constructing virally-resistant systems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reply to 'Comment on "A Framework for Modelling Trojans and Computer Virus Infection"' by E. Mäkinen

Computer viruses are a worrying real-world problem, and a challenge to theoretical modelling. In this issue of the Computer Journal, Erkki Mäkinen proposes universal Turing machines in a critique of an earlier paper, ‘A framework for modelling Trojans and computer virus infection’ (Thimbleby, H., Anderson, S. O. and Cairns, P. (1998) Comp. J., 41, 444–458). This short paper is a reply by those ...

متن کامل

Comment on 'A Framework for Modelling Trojans and Computer Virus Infection'

Thimbleby et al. [1] have recently introduced a framework for modelling computer viruses and other malicious programs. They also criticized the use of Turing machine (TM) models for the same purpose. This note (re-)introduces a universal Turing machine (UTM) model which originally appeared in [2] and discusses its properties in the light of Thimbleby et al.’s critique. We show that their points...

متن کامل

Modeling the Propagation of Trojan Malware in Online Social Networks

The popularity and widespread usage of online social networks (OSN) have attracted cyber criminals who have used OSNs as a platform to spread malware. Among different types of malware in OSNs, Trojan is the most popular type with hundreds of attacks on OSN users in the past few years. Trojans infecting a user’s computer have the ability to steal confidential information, install ransomware and ...

متن کامل

ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow

Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...

متن کامل

The impact of Microsoft Windows infection vectors on IP network traffic patterns and costs

This paper describes a set of tools and techniques to capture and analyse virus-generated IP network traffic. We analyse seven viruses, worms, trojans and spyware that are common in Microsoft Windows environments. We log and analyse the IP traffic generated in the roughly 2 hours after each infection. Based on the resulting IP traffic patterns we estimate the likely financial impact of having a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Comput. J.

دوره 41  شماره 

صفحات  -

تاریخ انتشار 1998