期刊文献+

广义病毒的形式化定义及识别算法 被引量:7

Formal Definition of Generalized Virus and Its Identifying Algorithm
下载PDF
导出
摘要 恶意软件的定义是多年来安全领域的研究重点.恶意软件包括病毒、蠕虫和木马.目前仅有病毒的形式化定义,蠕虫、木马没有公认的形式化定义.按照传统病毒的定义,不存在准确识别病毒的算法.文中提出代码是否为病毒是相对于用户而言的,给用户带来损害的代码才是病毒.据此观点,文中以用户意愿为标准,将病毒区分为显式病毒、隐式病毒,并给出了显式病毒的形式化定义和识别算法.理论分析表明,传统病毒以及大部分木马、蠕虫均属于显式病毒,实际案例分析也证实了这一点. The definition of malicious software is a hot in security domain.Malicious software includes virus,worm and Trojan horse.There is now only formal definition of virus,and no widely accepted formal definitions of worm and Trojan horse.According to definition of traditional virus,there is no algorithm to identify virus definitely.This paper proposes that whether a program code is virus is relative to user,and only those bringing damage to user are viruses.The paper distinguishes viruses to explicit virus and hidden virus based on user's intention,and presents a formal definition of explicit virus and its identifying algorithm.Both theoretical analysis and actual cases study indicates that traditional virus,most of worm,and Trojan horse are explicit viruses.
出处 《计算机学报》 EI CSCD 北大核心 2010年第3期562-568,共7页 Chinese Journal of Computers
基金 国家"八六三"高技术研究发展计划项目基金(2009AA01Z428)资助~~
关键词 病毒 蠕虫 木马 用户意愿 显式病毒 隐式病毒 virus worm Trojan horse user's intention explicit virus hidden virus
  • 相关文献

参考文献7

  • 1Singh Prabhat K, Lakhotia Arun. Analysis and detection of computer viruses and worms.. An annotated bibliography. ACM SIGNPLAN Notices, 2002, 37(2): 29-35.
  • 2Cohen F. Computer viruses-theory and experiments. Computers and Security, 1987, 6(1): 22-35.
  • 3Chess David M, White Steve R. An undetectable computer virus//Proceedings of the Virus Bulletin Conference. Orlando, FL, 2000.
  • 4Adleman L M. An abstract theory of computer viruses//Goldwasser J ed. Advances in CryptoIogy. LNCS 403. New York Springer-Verlag, 1988:354-374.
  • 5Cohen F. Computational aspects of computer viruses. Computers and Security, 1989, 8(4): 325-344.
  • 6Fred Cohen. A Case for Benevolent Viruses. California, USA: ASP Press, 1991.
  • 7Bontchev Vesselin. Are 'Good' computer viruses still a bad idea ?//Proceedings of the EICAR ' 94 Conference. Saint Albans, Hertfordshire, UK, 1994:25-47.

同被引文献46

  • 1蒋剑琴,罗宏,曾庆凯.程序缺陷分析与安全保护技术研究[J].计算机应用与软件,2007,24(1):19-23. 被引量:5
  • 2HEASMAN J. Implementing and detecting an ACPI BIOS Rootkit: Blackhat DC[R]. 2006.
  • 3HEASMAN J. "Implementing and detecting a PCI Rootkit: Blackhat DC [R]. 2007.
  • 4KING S T, TUCEK J, COZZIE A, et al. Designing and implementing malicious hardware [ C]//Proc of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats. 2008.
  • 5BORG S. Securing the supply chain for electronic equipment: a strategy and framework [ R ]. 2009.
  • 6COHEN F. Computer viruses-theory and experiments [ J ]. Computers and Security, 1987,6( 1 ) :22-35.
  • 7CHESS D M, WHITE S R. An undetectable computer virus[ C]// Proc of Virus Bulletin Conference. Orlando : [ s. n. ] , 2000.
  • 8NECULA G C. Pr0of-carrying code[ C]//Proc of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. Paris France: [s. n. ] , 1997:106-119.
  • 9BISHOP M. Computer security art and science[ M ]. Singapore:Pearson Education, 2005:435-436.
  • 10COHEN F. Computational aspects of computer viruses[ J]. Computers and Security, 1989,8(4) :325-344.

引证文献7

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部