Abstract
The analogy between computer viruses and biological viruses, from which computer viruses get their name [7], has been clear for the past several decades. During that time there has been progress in both understanding the vast diversity of biological viruses, and in abstract approaches to understanding computer viruses.
G. Bonfante—The first author received the support of ANR-12-INSE-002.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Adleman, L.M.: An abstract theory of computer viruses. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 354–374. Springer, Heidelberg (1990)
Amtoft, T., Thomas, H., Jesper, N., Träff, L., Jones, N.D.: Experiments with implementations of two theoretical constructions. In: Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, PLAS 2007, San Diego, California, USA, 14 June 2007, pp. 47–52. ACM (2007)
Bonfante, G., Kaczmarek, M., Marion, J.-Y.: A classification of viruses through recursion theorems. In: Cooper, S.B., Löwe, B., Sorbi, A. (eds.) CiE 2007. LNCS, vol. 4497, pp. 73–82. Springer, Heidelberg (2007)
Borello, J.-M., Mé, L.: Code obfuscation techniques for metamorphic viruses. J. Comput. Virol. 4(3), 211–220 (2008)
Case, J., Moelius, S.E.: Cautious virus detection in the extreme. In: Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, PLAS 2007, San Diego, California, USA, 14 June 2007, pp. 47–52. ACM (2007)
Case, J., Moelius, S.E.: Characterizing programming systems allowing program self-reference. Theory Comput. Syst. 45(4), 756–772 (2009)
Cohen, F.: Computer viruses: theory and experiments. Comput. Secur. 6(1), 22–35 (1987)
Collberg, C., Nagra, J.: Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection, 1st edn. Addison-Wesley Professional, New Jersey (2009)
Jones, N.D.: Computability and Complexity, from a Programming Perspective. MIT press, Cambridge (1997)
Moss, L.S.: Recursion theorems and self-replication via text register machine programs. Bull. EATCS 89, 171–182 (2006)
Rogers Jr., H.: Theory of Recursive Functions and Effective Computability. McGraw Hill, New York (1967)
Smullyan, R.M.: Recursion Theory for Metamathematics. Oxford University Press, Oxford (1993)
Zuo, Z., Zhou, M.: Some further theorical results about computer viruses. Comput. J. 47(6), 627–633 (2004)
Acknowledgements
The authors would like to thank the Institute for Advanced Study and the organizers of the 2012 Program in Theoretical Physics on Biology and Computation. In particular, we would like to thank Stanislas Leibler for several motivating discussions.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Bonfante, G., El-Aqqad, M., Greenbaum, B., Hoyrup, M. (2015). Immune Systems in Computer Virology. In: Beckmann, A., Mitrana, V., Soskova, M. (eds) Evolving Computability. CiE 2015. Lecture Notes in Computer Science(), vol 9136. Springer, Cham. https://doi.org/10.1007/978-3-319-20028-6_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-20028-6_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-20027-9
Online ISBN: 978-3-319-20028-6
eBook Packages: Computer ScienceComputer Science (R0)