Skip to main content
Log in

The blockchain potential in computer virology: leveraging combinatorial techniques of k-ary codes

Journal of Computer Virology and Hacking Techniques Aims and scope Submit manuscript

Cite this article


The threat landscape is continuously evolving and attackers are improving their tactics and techniques. From worms and viruses, initially introduced in 1982, to advanced, targeted and persistent attacks that have emerged in recent years, many verdicts demonstrate that no architecture is invulnerable. Nowadays, malware and cyberthreats are penetrating many platforms and the growth is exponential and a corporate and politically-driven outbreak has surfaced worldwide. A continuous back-and-forth between vulnerabilities and controls directs the evolution of the information age. Besides, intelligent technologies are a dual-use and a new class of smart cyberthreats is arisen. This paper presents a state of the art in computer virology and explores how we leveraged the blockchain technology to create a new form of malware offering a new aspect to the cyber-vector.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others


  1. A data stream network.

  2. An open-source database with real time capabilities.

  3. A helper platform to manage blockchain requests.

  4. An application where users can verify the existence of a particular content on the blockchain.


  1. Zeid, R.B., Moubarak, J., Bassil, C.: Investigating the darknet, In: 2020 International Wireless Communications and Mobile Computing (IWCMC), IEEE, pp. 727–732 (2020)

  2. Kaspersky: How to not break the internet (2016)

  3. Forum, W.E.: The global risks report 2018, 13th edition (2018)

  4. Cohen, F.: Computer viruses, Ph.D. thesis, University of Southern California (1985)

  5. Filiol, E.: Computer viruses: from theory to applications, vol. EW. Springer, New York (2006)

    MATH  Google Scholar 

  6. Filiol, É.: Techniques virales avancées. Springer, New York (2007)

    MATH  Google Scholar 

  7. Filiol, E.: Formalisation and implementation aspects of k-ary (malicious) codes. J. Comput. Virol. 3(2), 75–86 (2007)

    Article  Google Scholar 

  8. Moubarak, J., Chamoun, M., Filiol, E.: On distributed ledgers security and illegal uses. Future Gen.Comput. Syst. 113, 183–195 (2020)

    Article  Google Scholar 

  9. Shannon, C.E.: A universal turing machine with two internal states. Automat. Stud. 34, 157–165 (1956)

    MathSciNet  Google Scholar 

  10. Kleene, S.C.: General recursive functions of natural numbers. Math. Ann. 112(1), 727–742 (1936)

    Article  MathSciNet  Google Scholar 

  11. Kleene, S.C.: On notation for ordinal numbers. J.Symbol. Logic 3(4), 150–155 (1938)

    Article  Google Scholar 

  12. Von Neumann, J., Burks, A.W., et al.: Theory of self-reproducing automata. IEEE Trans. Neural Netw. 5(1), 3–14 (1966)

    Google Scholar 

  13. Risak, V.: Selbstreproduzierende automaten mit minimaler informationsübertragung. Zeitschrift für Maschinenbau und Elektrotechnik 89, 449–457 (1972)

    Google Scholar 

  14. Dubois, M.: Histoire des virus informatique - les origines (2006). Accessed 15 May 2021

  15. Core war: Darwin (1961). Accessed 15 May 2021

  16. Kraus, J.: Selbstreproduktion bei programmen, University Dortmund (Feb 1980) as of 21 oct 2007

  17. Damelincourt,J.: Virus informatique et virus biologiquev (2001). Accessed 15 May 2021

  18. Filiol, E., Helenius, M., Zanero, S.: Open problems in computer virology. J. Comput. Virol. 1(3–4), 55–66 (2006)

    Article  Google Scholar 

  19. Cohen, F.: Computer viruses: theory and experiments. Comput. Secur. 6(1), 22–35 (1987)

    Article  Google Scholar 

  20. Papadimitriou, C.H.: Complexity theory. Addison Wesley, Reading (1994)

    MATH  Google Scholar 

  21. Adleman, L.: An abstract theory of computer viruses. In: Advances in Cryptology—Crypto’88”, vol. 403, Lecture Notes in Computer Science

  22. Zuo, Z., Zhou, M.: Some further theoretical results about computer viruses. Comput. J. 47(6), 627–633 (2004)

    Article  Google Scholar 

  23. Zuo, Z.-H., Zhu, Q.-X., Zhou, M.-T.: On the time complexity of computer viruses. IEEE Trans. Inf. Theory 51(8), 2962–2966 (2005)

    Article  MathSciNet  Google Scholar 

  24. Spinellis, D.: Reliable identification of bounded-length viruses is np-complete. IEEE Trans. Inf. Theory 49(1), 280–284 (2003)

    Article  MathSciNet  Google Scholar 

  25. Bonfante, G., Kaczmarek, M., Marion, J.-Y.: On abstract computer virology from a recursion theoretic perspective. J. Comput. Virol. 1(3–4), 45–54 (2006)

    Article  Google Scholar 

  26. Filiol, E.: Malicious cryptology and mathematics. In: Cryptography and Security in Computing. IntechOpen (2012)

  27. Filiol, E.: Malware pattern scanning schemes secure against black-box analysis. J. Comput. Virol. 2(1), 35–50 (2006)

    Article  Google Scholar 

  28. Josse, S.: Analyse et détection dynamique de codes viraux dans un contexte cryptographique, Ph.D. thesis (2009)

  29. Adleman, L.M. An abstract theory of computer viruses. In: Conference on the theory and application of cryptography, pp. 354–374. Springer, New York, NY (1988)

  30. Filiol, E.: Metamorphism, formal grammars and undecidable code mutation. Int. J. Comput. Sci. 2(1), 70–75 (2007)

    Google Scholar 

  31. Filiol, É.: L’évolution des idées en virologie informatique

  32. Filiol, Malware of the future

  33. Dalla Preda, M., Di Giusto, C.: Hunting distributed malware with the \(\kappa \)-calculus. In international symposium on fundamentals of computation theory, pp. 102–113. Springer, Berlin, Heidelberg (2011)

  34. Gueguen, G.: Van wijngaarden grammars, metamorphism and k-ary malwares, arXiv preprint arXiv:1009.4012

  35. de Drézigué, D., Fizaine, J.-P., Hansma, N.: In-depth analysis of the viral threats with documents. J. Comput. Virol. 2(3), 187–210 (2006)

    Article  Google Scholar 

  36. Jacob, G., Filiol, E., Debar, H.: Formalization of viruses and malware through process algebras. In: 2010. ARES’10 International Conference on Availability, Reliability, and Security, pp. 597–602. IEEE (2010)

  37. Filiol, E., Dechaux, J., Fizaine, J.-P.: Perverting emails: a new dimension in internet (in) security. In: European Conference on Cyber Warfare and Security, Academic Conferences International Limited, p. 91 (2011)

  38. Desnos, A.: Implementation of k-ary viruses in python, Hack. lu

  39. Guyot, V., Gademer, A., Avanthey, L., Beaudoin, L., Erra, R.: Swarm UAV attack: how to protect sensitive data. In: Proceedings of European Conference on Information Warfare and Security ECIW 2012 (2012)

  40. Tokhtabayev, A.G., Skormin, V.A., Dolgikh, A.M.: Expressive, efficient and obfuscation resilient behavior based IDS. In: European Symposium on Research in Computer Security, pp. 698–715. Springer (2010)

  41. Moubarak, J., Chamoun, M., Filiol, E.: Comparative study of recent MEA malware phylogeny. In: 2017 2nd International Conference on Computer and Communication Systems (ICCCS), pp. 16–20. IEEE (2017)

  42. Deka, D., Sarma, N., Panicker, N.J.: Malware detection vectors and analysis techniques: a brief survey. In: 2016 International Conference on Accessibility to Digital World (ICADW), pp. 81–85. IEEE (2016)

  43. Moubarak, J., Feghali, T.: Comparing machine learning techniques for malware detection. In: ICISSP, pp. 844–851 (2020)

  44. Bazrafshan, Z., Hashemi, H., Fard, S.M.H., Hamzeh, A.: A survey on heuristic malware detection techniques. In: The 5th Conference on Information and Knowledge Technology, pp. 113–120. IEEE (2013)

  45. Jilcott, S.: Scalable malware forensics using phylogenetic analysis. In: 2015 IEEE International Symposium on Technologies for Homeland Security (HST), pp. 1–6. IEEE (2015)

  46. McAfee, Powerful advanced threat detection (2015)

  47. PaloAlto, Next Generation Firewall (2017)

  48. FireEye, Endpoint (2017)

  49. Kaspersky, Endpoint Security for Business (2017)

  50. You, I., Yim, K.: Malware obfuscation techniques: a brief survey. In: 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, pp. 297–300. IEEE (2010)

  51. Chow, S., Gu, Y., Johnson, H., Zakharov, V.A.: An approach to the obfuscation of control-flow of sequential computer programs. In: International Conference on Information Security, pp. 144–155. Springer (2001)

  52. Shah, P.: Code obfuscation for prevention of malicious reverse engineering attacks. J. Comput. Netw Securi. ECE 578

  53. Collberg, C.S., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation-tools for software protection. IEEE Trans. Softw. Eng. 28(8), 735–746 (2002)

    Article  Google Scholar 

  54. Beaucamps, P., Filiol, É.: On the possibility of practically obfuscating programs towards a unified perspective of code protection. J. Comput. Virol. 3(1), 3–21 (2007)

    Article  Google Scholar 

  55. Hammond, R.P.: Method and system for dynamic injection of dynamic link libraries into a windowed operating system, US Patent 6,550,060 (Apr. 15 2003)

  56. Ter Louw, M., Lim, J.S., Venkatakrishnan, V.N.: Enhancing web browser security against malware extensions. J. Comput. Virol. 4(3), 179–195 (2008)

    Article  Google Scholar 

  57. Filiol, E., David, B.: Year in crypto in light of snowden’s leaks (past, present and future) (2014)

  58. Riordan, J., Schneier, B.: Environmental key generation towards clueless agents. Mobile Agents Secur. 1419, 15–24 (1998)

    Article  Google Scholar 

  59. Pubnub, Build a Proof of Existence Service in the Blockchain (2017)

  60. Eloudrhiri, S.: Become a blockchain developer with ethereum and solidity

  61. Pimenov, K.: Security alert. (Retrieved June 5th, 2018)

  62. Hartman, J.H., Murdock, I., Spalink, T.: The swarm scalable storage system. In: 19th IEEE International Conference on Distributed Computing Systems, 1999. Proceedings, pp. 74–81. IEEE (1999)

  63. Benet, J.: Ipfs-content addressed, versioned, p2p file system. arXiv preprint arXiv:1407.3561

  64. Benet, J.: The interplanetary file system (2018). Accessed 15 May 2021

  65. Tron, V., Fischer, A., Nagy, D., Felföld, Z., Johnson, N.: Swarm, Etherspher (2016)

  66. Wood, G.: Ethereum: A secure decentralised generalised transaction ledger, Ethereum Project Yellow Paper 151

  67. Service, E.N.: Ipfs (2018). Accessed 15 May 2021

  68. Maymounkov, P., Mazieres, D.: Kademlia: A peer-to-peer information system based on the XOR metric. In: International Workshop on Peer-to-Peer Systems, pp. 53–65. Springer (2002)

  69. Bahga, A., Madisetti, V.: Blockchain Applications: A Hands-on Approach, VPT (2017)

  70. Bourneuf, L.: Ipfs, l’intérêt, le but et le fonctionnement. (Retrieved July 4th, 2019)

  71. Moubarak, J., Chamoun, M., Filiol, E.: Hiding malware on distributed storage. In: 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), pp. 720–725. IEEE (2019)

  72. Labs, P.: Ipfs documentation—install ipfs (2018). Accessed 15 May 2021

  73. T. go-ethereum Authors, Installing go ethereum (2016). Accessed 15 May 2021

  74. Filiol, E.: Formalisation and implementation aspects of K-ary (malicious) codes. J. Comput. Virol. 3(2), 75–86 (2007).

    Article  Google Scholar 

  75. Filiol, E.: Strong cryptography armoured computer viruses forbidding code analysis: the bradley virus. In: EICAR 2005, pp. 216–227 (2005).

  76. Threats, K.: Virus.dos.darkparanoid. (Retrieved June 5th, 2019)

  77. Riordan, J., Schneier, B.: Environmental key generation towards clueless agents. In: Mobile Agents and Security, pp. 15–24 (1998).

  78. Beaucamps, P., Filiol, E.: On the possibility of practically obfuscating programs - towards a unified perspective of code protection. J. Comput. Virol.

  79. Desnos, A., Erra, R., Filiol, E.: Processor-dependent malware... and codes, CoRR arXiv:1011.1638

  80. Shannon, C.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656–719 (1949)

    Article  MathSciNet  Google Scholar 

  81. Cohen, F.: Computer viruses. Comput. Secur. 6(1), 22–35 (1987).

    Article  Google Scholar 

  82. Moubarak, J., Filiol, E., Chamoun, M.: On blockchain security and relevant attacks. In: Communications Conference (MENACOMM), IEEE Middle East and North Africa, pp. 1–6. IEEE (2018)

  83. Moubarak, J., Filiol, E., Chamoun, M.: Comparative analysis of blockchain technologies and tor network: two faces of the same reality? In: Cyber Security in Networking Conference (CSNet), 2017 1st, pp. 1–9. IEEE (2017)

  84. Moubarak, J., Chamoun, M., Filiol, E.: Developing a k-ary malware using blockchain. In: NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, pp. 1–4. IEEE (2018)

Download references

Author information

Authors and Affiliations


Corresponding author

Correspondence to Joanna Moubarak.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Moubarak, J., Filiol, E. & Chamoun, M. The blockchain potential in computer virology: leveraging combinatorial techniques of k-ary codes. J Comput Virol Hack Tech 17, 199–220 (2021).

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: