Journal in Computer Virology

, Volume 1, Issue 3–4, pp 45–54 | Cite as

On Abstract Computer Virology from a Recursion Theoretic Perspective

  • G. Bonfante
  • M. Kaczmarek
  • J.-Y. MarionEmail author
Original Paper


We are concerned with theoretical aspects of computer viruses. For this, we suggest a new definition of viruses which is clearly based on the iteration theorem and above all on Kleene's recursion theorem. We in this study capture in a natural way previous definitions, and in particular the one of Adleman. We establish generic virus constructions and we illustrate them by various examples. Lastly, we show the results on virus detection.


Computer virus Computability Recursion theorem Self-reference Polymorphic virus Companion virus Detection 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Adleman, L.M.: An abstract theory of computer viruses. In: Advances in Cryptology – CRYPTO'88, vol. 403. Lecture notes in computer science (1988)Google Scholar
  2. 2.
    Bishop M. (1991). An overview of computer viruses in a research environment. Technical report, Dartmouth College, Hanover, NHGoogle Scholar
  3. 3.
    Blum M. (1967). A machine independent theory of the complexity of recursive functions. J ACM 14:322–336Google Scholar
  4. 4.
    Bonfante, G., Kaczmarek, M., Marion, J-Y.: Toward an abstract computer virology. In: Lecture notes in computer science, vol. 3722, pp 579–593 (2005)Google Scholar
  5. 5.
    Chess, D.M., White, S.R.: An undetectable computer virus (2000)Google Scholar
  6. 6.
    Cohen, F.: Computer viruses. PhD Thesis, University of Southern California (1986)Google Scholar
  7. 7.
    Cohen F. (1987). Computer viruses: theory and experiments. Comput Secur 6(1):22–35Google Scholar
  8. 8.
    Cohen F. (1988). On the implications of computer viruses and methods of defense. Comput Secur 7:167–184Google Scholar
  9. 9.
    Cohen F. (1989). Computational aspects of computer viruses. Comput Secur 8:325–344Google Scholar
  10. 10.
    Filiol, F.: Les virus informatiques: th讲ie, pratique et applications. Springer-Verlag France: 2004. Translation [11]Google Scholar
  11. 11.
    Filiol, F.: Computer viruses: from theory to applications. Springer Berlin Heidelberg New York 2005Google Scholar
  12. 12.
    Goel S., Bush S.F. (2003). Kolmogorov complexity estimates for detection of viruses in biologically inspired security systems: a comparison with traditional approaches. Complex 9(2):54–73Google Scholar
  13. 13.
    Anderson S., Thimbleby H., Cairns P. (1999). A framework for medelling trojans and computer virus infection. Comput Journal 41:444–458Google Scholar
  14. 14.
    Jain J., Osherson D., Royer J., Sharma A. (1999). Systems that learn. MIT, CambridgeGoogle Scholar
  15. 15.
    Jones, N.D.: Computer implementation and applications of kleene's S-m-n and recursive theorems. In: Moschovakis, Y.N. (ed.) Lecture notes in mathematics, logic from computer science, pp 243–263 (1991)Google Scholar
  16. 16.
    Jones N.D. (1997). Computability and complexity: from a programming perspective. MIT, Cambridge, MAGoogle Scholar
  17. 17.
    Kleene, S.C: Introduction to metamathematics. Van Nostrand 1952Google Scholar
  18. 18.
    Ludwig, M.A.: The giant black book of computer viruses. sun city west: American Eagle Publications 1998Google Scholar
  19. 19.
    Myhill J. (1955). Creative sets. Zeit fur Math Logik und Grund der Math. 1:97–108Google Scholar
  20. 20.
    Odifreddi, P.: Classical recursion theory. Amsterdam North-Holland 1989Google Scholar
  21. 21.
    Rogers H. (1958). Gödel numberings of partial recursive function. J Symbol Logic 23(3):331–341Google Scholar
  22. 22.
    Rogers H. Jr. (1967). Theory of recursive functions and effective computability. McGraw Hill, New YorkGoogle Scholar
  23. 23.
    Smullyan R.M. (1961). Theory of formal systems. Princeton University Press, PrincetonGoogle Scholar
  24. 24.
    Smullyan R.M. (1993). Recursion theory for metamathematics. Oxford University Press, New York, TranslationGoogle Scholar
  25. 25.
    Smullyan R.M. (1994). Diagonalization and self-reference. Oxford University Press, New yorkGoogle Scholar
  26. 26.
    Szor P.: The art of computer virus research and defense.Reading Addison-Wesley Professional 2005Google Scholar
  27. 27.
    Thompson, K.: Reflections on trusting trust. Commun ACM 27:761–763, (1984). Also appears in ACM Turing Award Lectures: the first twenty years 1965–1985Google Scholar
  28. 28.
    Uspenskii, V.A.: Enumeration operators and the concept of program. Uspekhi Matematicheskikh Nauk 11, (1956)Google Scholar
  29. 29.
    von Neumann, J.: Theory of self-reproducing automata. Urbana, IL: University of Illinois Press, Urbana, Illinois, 1966. Edited and completed by A.W. BurksGoogle Scholar
  30. 30.
    Zuo, Z., Zhou, M.: Some further theorical results about computer viruses. In: The computer journal (2004)Google Scholar

Copyright information

© Springer-Verlag 2006

Authors and Affiliations

  1. 1.Loria - INPLEcole Nationale Supérieure des Mines de NancyVandœuvre-lès-Nancy CédexFrance

Personalised recommendations