Nothing Special   »   [go: up one dir, main page]

Skip to main content

Immune Systems in Computer Virology

  • Conference paper
  • First Online:
Evolving Computability (CiE 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9136))

Included in the following conference series:

  • 644 Accesses

Abstract

The analogy between computer viruses and biological viruses, from which computer viruses get their name [7], has been clear for the past several decades. During that time there has been progress in both understanding the vast diversity of biological viruses, and in abstract approaches to understanding computer viruses.

G. Bonfante—The first author received the support of ANR-12-INSE-002.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Adleman, L.M.: An abstract theory of computer viruses. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 354–374. Springer, Heidelberg (1990)

    Chapter  Google Scholar 

  2. Amtoft, T., Thomas, H., Jesper, N., Träff, L., Jones, N.D.: Experiments with implementations of two theoretical constructions. In: Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, PLAS 2007, San Diego, California, USA, 14 June 2007, pp. 47–52. ACM (2007)

    Google Scholar 

  3. Bonfante, G., Kaczmarek, M., Marion, J.-Y.: A classification of viruses through recursion theorems. In: Cooper, S.B., Löwe, B., Sorbi, A. (eds.) CiE 2007. LNCS, vol. 4497, pp. 73–82. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  4. Borello, J.-M., Mé, L.: Code obfuscation techniques for metamorphic viruses. J. Comput. Virol. 4(3), 211–220 (2008)

    Article  Google Scholar 

  5. Case, J., Moelius, S.E.: Cautious virus detection in the extreme. In: Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, PLAS 2007, San Diego, California, USA, 14 June 2007, pp. 47–52. ACM (2007)

    Google Scholar 

  6. Case, J., Moelius, S.E.: Characterizing programming systems allowing program self-reference. Theory Comput. Syst. 45(4), 756–772 (2009)

    Article  MATH  MathSciNet  Google Scholar 

  7. Cohen, F.: Computer viruses: theory and experiments. Comput. Secur. 6(1), 22–35 (1987)

    Article  Google Scholar 

  8. Collberg, C., Nagra, J.: Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection, 1st edn. Addison-Wesley Professional, New Jersey (2009)

    Google Scholar 

  9. Jones, N.D.: Computability and Complexity, from a Programming Perspective. MIT press, Cambridge (1997)

    MATH  Google Scholar 

  10. Moss, L.S.: Recursion theorems and self-replication via text register machine programs. Bull. EATCS 89, 171–182 (2006)

    MATH  MathSciNet  Google Scholar 

  11. Rogers Jr., H.: Theory of Recursive Functions and Effective Computability. McGraw Hill, New York (1967)

    MATH  Google Scholar 

  12. Smullyan, R.M.: Recursion Theory for Metamathematics. Oxford University Press, Oxford (1993)

    MATH  Google Scholar 

  13. Zuo, Z., Zhou, M.: Some further theorical results about computer viruses. Comput. J. 47(6), 627–633 (2004)

    Article  Google Scholar 

Download references

Acknowledgements

The authors would like to thank the Institute for Advanced Study and the organizers of the 2012 Program in Theoretical Physics on Biology and Computation. In particular, we would like to thank Stanislas Leibler for several motivating discussions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guillaume Bonfante .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Bonfante, G., El-Aqqad, M., Greenbaum, B., Hoyrup, M. (2015). Immune Systems in Computer Virology. In: Beckmann, A., Mitrana, V., Soskova, M. (eds) Evolving Computability. CiE 2015. Lecture Notes in Computer Science(), vol 9136. Springer, Cham. https://doi.org/10.1007/978-3-319-20028-6_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-20028-6_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-20027-9

  • Online ISBN: 978-3-319-20028-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics