Abstract
The threat landscape is continuously evolving and attackers are improving their tactics and techniques. From worms and viruses, initially introduced in 1982, to advanced, targeted and persistent attacks that have emerged in recent years, many verdicts demonstrate that no architecture is invulnerable. Nowadays, malware and cyberthreats are penetrating many platforms and the growth is exponential and a corporate and politically-driven outbreak has surfaced worldwide. A continuous back-and-forth between vulnerabilities and controls directs the evolution of the information age. Besides, intelligent technologies are a dual-use and a new class of smart cyberthreats is arisen. This paper presents a state of the art in computer virology and explores how we leveraged the blockchain technology to create a new form of malware offering a new aspect to the cyber-vector.
This is a preview of subscription content,
to check access.


Similar content being viewed by others
Notes
A data stream network. https://www.pubnub.com/.
An open-source database with real time capabilities. https://rethinkdb.com/
A helper platform to manage blockchain requests. https://tierion.com/.
An application where users can verify the existence of a particular content on the blockchain.
References
Zeid, R.B., Moubarak, J., Bassil, C.: Investigating the darknet, In: 2020 International Wireless Communications and Mobile Computing (IWCMC), IEEE, pp. 727–732 (2020)
Kaspersky: How to not break the internet (2016)
Forum, W.E.: The global risks report 2018, 13th edition (2018)
Cohen, F.: Computer viruses, Ph.D. thesis, University of Southern California (1985)
Filiol, E.: Computer viruses: from theory to applications, vol. EW. Springer, New York (2006)
Filiol, É.: Techniques virales avancées. Springer, New York (2007)
Filiol, E.: Formalisation and implementation aspects of k-ary (malicious) codes. J. Comput. Virol. 3(2), 75–86 (2007)
Moubarak, J., Chamoun, M., Filiol, E.: On distributed ledgers security and illegal uses. Future Gen.Comput. Syst. 113, 183–195 (2020)
Shannon, C.E.: A universal turing machine with two internal states. Automat. Stud. 34, 157–165 (1956)
Kleene, S.C.: General recursive functions of natural numbers. Math. Ann. 112(1), 727–742 (1936)
Kleene, S.C.: On notation for ordinal numbers. J.Symbol. Logic 3(4), 150–155 (1938)
Von Neumann, J., Burks, A.W., et al.: Theory of self-reproducing automata. IEEE Trans. Neural Netw. 5(1), 3–14 (1966)
Risak, V.: Selbstreproduzierende automaten mit minimaler informationsübertragung. Zeitschrift für Maschinenbau und Elektrotechnik 89, 449–457 (1972)
Dubois, M.: Histoire des virus informatique - les origines (2006). http://vaccin.sourceforge.net. Accessed 15 May 2021
Core war: Darwin (1961). https://corewar.co.uk/darwin.htm. Accessed 15 May 2021
Kraus, J.: Selbstreproduktion bei programmen, University Dortmund (Feb 1980) http://vx.netlux.org/lib/mjk00.html as of 21 oct 2007
Damelincourt,J.: Virus informatique et virus biologiquev (2001). https://www.futura-sciences.com/tech/dossiers/informatique-virus-informatiques-28/page/3/. Accessed 15 May 2021
Filiol, E., Helenius, M., Zanero, S.: Open problems in computer virology. J. Comput. Virol. 1(3–4), 55–66 (2006)
Cohen, F.: Computer viruses: theory and experiments. Comput. Secur. 6(1), 22–35 (1987)
Papadimitriou, C.H.: Complexity theory. Addison Wesley, Reading (1994)
Adleman, L.: An abstract theory of computer viruses. In: Advances in Cryptology—Crypto’88”, vol. 403, Lecture Notes in Computer Science
Zuo, Z., Zhou, M.: Some further theoretical results about computer viruses. Comput. J. 47(6), 627–633 (2004)
Zuo, Z.-H., Zhu, Q.-X., Zhou, M.-T.: On the time complexity of computer viruses. IEEE Trans. Inf. Theory 51(8), 2962–2966 (2005)
Spinellis, D.: Reliable identification of bounded-length viruses is np-complete. IEEE Trans. Inf. Theory 49(1), 280–284 (2003)
Bonfante, G., Kaczmarek, M., Marion, J.-Y.: On abstract computer virology from a recursion theoretic perspective. J. Comput. Virol. 1(3–4), 45–54 (2006)
Filiol, E.: Malicious cryptology and mathematics. In: Cryptography and Security in Computing. IntechOpen (2012)
Filiol, E.: Malware pattern scanning schemes secure against black-box analysis. J. Comput. Virol. 2(1), 35–50 (2006)
Josse, S.: Analyse et détection dynamique de codes viraux dans un contexte cryptographique, Ph.D. thesis (2009)
Adleman, L.M. An abstract theory of computer viruses. In: Conference on the theory and application of cryptography, pp. 354–374. Springer, New York, NY (1988)
Filiol, E.: Metamorphism, formal grammars and undecidable code mutation. Int. J. Comput. Sci. 2(1), 70–75 (2007)
Filiol, É.: L’évolution des idées en virologie informatique
Filiol, Malware of the future
Dalla Preda, M., Di Giusto, C.: Hunting distributed malware with the \(\kappa \)-calculus. In international symposium on fundamentals of computation theory, pp. 102–113. Springer, Berlin, Heidelberg (2011)
Gueguen, G.: Van wijngaarden grammars, metamorphism and k-ary malwares, arXiv preprint arXiv:1009.4012
de Drézigué, D., Fizaine, J.-P., Hansma, N.: In-depth analysis of the viral threats with openoffice.org documents. J. Comput. Virol. 2(3), 187–210 (2006)
Jacob, G., Filiol, E., Debar, H.: Formalization of viruses and malware through process algebras. In: 2010. ARES’10 International Conference on Availability, Reliability, and Security, pp. 597–602. IEEE (2010)
Filiol, E., Dechaux, J., Fizaine, J.-P.: Perverting emails: a new dimension in internet (in) security. In: European Conference on Cyber Warfare and Security, Academic Conferences International Limited, p. 91 (2011)
Desnos, A.: Implementation of k-ary viruses in python, Hack. lu
Guyot, V., Gademer, A., Avanthey, L., Beaudoin, L., Erra, R.: Swarm UAV attack: how to protect sensitive data. In: Proceedings of European Conference on Information Warfare and Security ECIW 2012 (2012)
Tokhtabayev, A.G., Skormin, V.A., Dolgikh, A.M.: Expressive, efficient and obfuscation resilient behavior based IDS. In: European Symposium on Research in Computer Security, pp. 698–715. Springer (2010)
Moubarak, J., Chamoun, M., Filiol, E.: Comparative study of recent MEA malware phylogeny. In: 2017 2nd International Conference on Computer and Communication Systems (ICCCS), pp. 16–20. IEEE (2017)
Deka, D., Sarma, N., Panicker, N.J.: Malware detection vectors and analysis techniques: a brief survey. In: 2016 International Conference on Accessibility to Digital World (ICADW), pp. 81–85. IEEE (2016)
Moubarak, J., Feghali, T.: Comparing machine learning techniques for malware detection. In: ICISSP, pp. 844–851 (2020)
Bazrafshan, Z., Hashemi, H., Fard, S.M.H., Hamzeh, A.: A survey on heuristic malware detection techniques. In: The 5th Conference on Information and Knowledge Technology, pp. 113–120. IEEE (2013)
Jilcott, S.: Scalable malware forensics using phylogenetic analysis. In: 2015 IEEE International Symposium on Technologies for Homeland Security (HST), pp. 1–6. IEEE (2015)
McAfee, Powerful advanced threat detection (2015)
PaloAlto, Next Generation Firewall (2017)
FireEye, Endpoint (2017)
Kaspersky, Endpoint Security for Business (2017)
You, I., Yim, K.: Malware obfuscation techniques: a brief survey. In: 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, pp. 297–300. IEEE (2010)
Chow, S., Gu, Y., Johnson, H., Zakharov, V.A.: An approach to the obfuscation of control-flow of sequential computer programs. In: International Conference on Information Security, pp. 144–155. Springer (2001)
Shah, P.: Code obfuscation for prevention of malicious reverse engineering attacks. J. Comput. Netw Securi. ECE 578
Collberg, C.S., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation-tools for software protection. IEEE Trans. Softw. Eng. 28(8), 735–746 (2002)
Beaucamps, P., Filiol, É.: On the possibility of practically obfuscating programs towards a unified perspective of code protection. J. Comput. Virol. 3(1), 3–21 (2007)
Hammond, R.P.: Method and system for dynamic injection of dynamic link libraries into a windowed operating system, US Patent 6,550,060 (Apr. 15 2003)
Ter Louw, M., Lim, J.S., Venkatakrishnan, V.N.: Enhancing web browser security against malware extensions. J. Comput. Virol. 4(3), 179–195 (2008)
Filiol, E., David, B.: Year in crypto in light of snowden’s leaks (past, present and future) (2014)
Riordan, J., Schneier, B.: Environmental key generation towards clueless agents. Mobile Agents Secur. 1419, 15–24 (1998)
Pubnub, Build a Proof of Existence Service in the Blockchain (2017)
Eloudrhiri, S.: Become a blockchain developer with ethereum and solidity
Pimenov, K.: Security alert. https://www.parity.io/security-alert-3/ (Retrieved June 5th, 2018)
Hartman, J.H., Murdock, I., Spalink, T.: The swarm scalable storage system. In: 19th IEEE International Conference on Distributed Computing Systems, 1999. Proceedings, pp. 74–81. IEEE (1999)
Benet, J.: Ipfs-content addressed, versioned, p2p file system. arXiv preprint arXiv:1407.3561
Benet, J.: The interplanetary file system (2018). http://github.com/ipfs. Accessed 15 May 2021
Tron, V., Fischer, A., Nagy, D., Felföld, Z., Johnson, N.: Swarm, Etherspher (2016)
Wood, G.: Ethereum: A secure decentralised generalised transaction ledger, Ethereum Project Yellow Paper 151
Service, E.N.: Ipfs (2018). https://ens.domains/. Accessed 15 May 2021
Maymounkov, P., Mazieres, D.: Kademlia: A peer-to-peer information system based on the XOR metric. In: International Workshop on Peer-to-Peer Systems, pp. 53–65. Springer (2002)
Bahga, A., Madisetti, V.: Blockchain Applications: A Hands-on Approach, VPT (2017)
Bourneuf, L.: Ipfs, l’intérêt, le but et le fonctionnement. https://lucas.bourneuf.net/blog/ipfs.html (Retrieved July 4th, 2019)
Moubarak, J., Chamoun, M., Filiol, E.: Hiding malware on distributed storage. In: 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), pp. 720–725. IEEE (2019)
Labs, P.: Ipfs documentation—install ipfs (2018). https://docs.ipfs.io/install/. Accessed 15 May 2021
T. go-ethereum Authors, Installing go ethereum (2016). https://geth.ethereum.org/install/. Accessed 15 May 2021
Filiol, E.: Formalisation and implementation aspects of K-ary (malicious) codes. J. Comput. Virol. 3(2), 75–86 (2007). https://doi.org/10.1007/s11416-007-0044-2
Filiol, E.: Strong cryptography armoured computer viruses forbidding code analysis: the bradley virus. In: EICAR 2005, pp. 216–227 (2005). http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.77.8299&rep=rep1&type=pdf
Threats, K.: Virus.dos.darkparanoid. https://threats.kaspersky.com/en/threat/Virus.DOS.DarkParanoid/ (Retrieved June 5th, 2019)
Riordan, J., Schneier, B.: Environmental key generation towards clueless agents. In: Mobile Agents and Security, pp. 15–24 (1998). https://doi.org/10.1007/3-540-68671-1_2
Beaucamps, P., Filiol, E.: On the possibility of practically obfuscating programs - towards a unified perspective of code protection. J. Comput. Virol. https://doi.org/10.1007/s11416-006-0029-6
Desnos, A., Erra, R., Filiol, E.: Processor-dependent malware... and codes, CoRR arXiv:1011.1638
Shannon, C.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656–719 (1949)
Cohen, F.: Computer viruses. Comput. Secur. 6(1), 22–35 (1987). https://doi.org/10.1016/0167-4048(87)90122-2
Moubarak, J., Filiol, E., Chamoun, M.: On blockchain security and relevant attacks. In: Communications Conference (MENACOMM), IEEE Middle East and North Africa, pp. 1–6. IEEE (2018)
Moubarak, J., Filiol, E., Chamoun, M.: Comparative analysis of blockchain technologies and tor network: two faces of the same reality? In: Cyber Security in Networking Conference (CSNet), 2017 1st, pp. 1–9. IEEE (2017)
Moubarak, J., Chamoun, M., Filiol, E.: Developing a k-ary malware using blockchain. In: NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, pp. 1–4. IEEE (2018)
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Moubarak, J., Filiol, E. & Chamoun, M. The blockchain potential in computer virology: leveraging combinatorial techniques of k-ary codes. J Comput Virol Hack Tech 17, 199–220 (2021). https://doi.org/10.1007/s11416-021-00389-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11416-021-00389-9