期刊文献+

基于扩展通用图灵机的计算机病毒传染模型 被引量:2

A Computer Viruses' Infection Model Based on an Expanded Universal Turing Machine
下载PDF
导出
摘要 在计算机基础理论模型———图灵机模型的基础上 ,提出了一种扩展的通用图灵机 (EUTM)模型 ,这种模型突出了计算机病毒的传染特性 ,极大地简化了计算机病毒传染的形式描述 ,并根据EUTM模型给出了计算机病毒的形式定义 ,形式化描述了计算机病毒在单机和多机环境下的传染 最后指出了FredCohen关于病毒检测不可判定性定理证明的不足 。 A model of an expanded universal Turing machine(EUTM) based on the model of Turing machine is proposed,which is the basic theory of computer, and the infection of computer viruses is formally described according to the EUTM model in the circumstance of a single machine and multi machine environment The procedure or virus is considered as the code of Turing machine, and the code of Turing machine is regarded as the input of the EUTM model EUTM reads the inputs,copies the inputs on the storage's tape, and at the same time writes the results on the output's tape A procedure is a virus iff ① ‖Φ v(p)‖ =‖v‖‖x‖;② 〈Φ v(p)〉〈v〉 or 〈Φ v(p)〉〈V(v)〉;③ Φ v(p) has the properties of procedure v , that is to say, Φ Φ(p′) satisfies the condition 1 and 2 The deficiencies of Fred Cohen's proof about virus undetectability theory are pointed out And the theory of virus undetectability is proved based on the EUTM model The model of the EUTM simplifies the formal description of computer viruses' infection and emphasizes the basic property of computer viruses
出处 《计算机研究与发展》 EI CSCD 北大核心 2003年第9期1300-1306,共7页 Journal of Computer Research and Development
基金 国家"八六三"高技术研究发展计划基金资助项目 ( 863 3 0 7 7 5 )
关键词 病毒传染模型 扩展通用图灵机 图灵机 infection model of computer viruses expanded universal Turing machine Turing machine
  • 相关文献

参考文献6

  • 1Fred Cohen. Computer virus theory and experiments. Computer & Security, 1987, 6(1): 22-35.
  • 2Eugene H Spafford. Computer Viruses as Artificial Life. MA: MIT Press, 1994.
  • 3Maekinen Erkki. Comment on ‘ A framework for modeling Trojans and computer virus infection'. Computer Journal, 2001, 44 (3) :321-323.
  • 4H W Thimbleby, S O Anderson, P Cairns. A framework for modeling Trojans and computer virus infection. Computer Journal,1998, 41(2): 444-458.
  • 5Fred Cohen. Computational aspects of computer viruses. Computer & Sectwity, 1989, 8(4): 325-344.
  • 6K Kauranen, E Makinen. A note on Cohen's formal model for computer viruses. ACM SIGSAC Rev, 1990, 8(1): 40-43.

同被引文献51

  • 1许丹,李翔,汪小帆.复杂网络理论在互联网病毒传播研究中的应用[J].复杂系统与复杂性科学,2004,1(3):10-26. 被引量:32
  • 2Milan Vojnovic,Ayalvadi Ganesh.On the Effectiveness of Automatic Patching. Workshop on Rapid Malcode (WORM’’ 05) .
  • 3Carey Nachenberg.From Antivirus to AntiWorm: A New Strategy for A New Threat Landscape. ACM Workshop on Rapid Malcode (WORM’’ 04) .
  • 4Helen J.Wang,Chuanxiong Guo,Daniel R.Simon, et al.Shield:VulnerabihtyDriven Network Filters for Preventing Known Vulnerability Exploits. SIGCOMM’’04 . 2004
  • 5Spyros Antonatos,Periklis Akritidis,Evangelos Markatos,Kostas G.Anagnostakis.Defending Against Hitlist Worms Using Network Address Space Randomization. Workshop on Rapid Malcode (WORM’’ 05) .
  • 6Kurt Rohloff,Tamer Basar.The Detection of RCS Worm Epidemics. Workshop on Rapid Malcode (WORM’’ 05) .
  • 7Weaver N.Potential strategies for high speed active worms. http://www.cs.berkeley.edu/-nweaver/ worms.pdf . 2002
  • 8Staniford S,Paxson V,Weaver N.How to own the ??Internet in your spare time. Proc.of the 11th Usenix Security Symp . 2002
  • 9ZHENG Hui,SUN Bin,ZHENG Xian-Wei,DUAN Hai-Xin.Contain Internet worm with Domain Name Service in large scale network. Journal of Software . 2004
  • 10Moheeb Abu Rajab,Fabian Monrose,Andreas Terzis.Worm Evolution Tracking via Timing Analysis. Workshop on Rapid Malcode (WORM’’ 05) .

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部