Abstract
This paper presents a new class of (malicious) codes denoted k-ary codes. Instead of containing the whole instructions composing the program's action, this type of codes is composed of k distinct parts which constitute a partition of the entire code. Each of these parts contains only a subset of the instructions. When considered alone (e.g. by an antivirus) every part cannot be distinguished from a normal uninfected program while their respective action combined according to different possible modes results in the offensive behaviour. In this paper, we presents a formalisation of this type of codes by means of Boolean functions and give their detailed taxonomy. We first show that classical malware are just a particular instance of this general model then we specifically address the case of k-ary codes. We give some complexity results about their detection based on the interaction between the different parts. As a general result, the detection is proved to be NP-complete. © Springer-Verlag France 2007.
Author supplied keywords
Cite
CITATION STYLE
Filiol, E. (2007). Formalisation and implementation aspects of K-ary (malicious) codes. Journal in Computer Virology, 3(2), 75–86. https://doi.org/10.1007/s11416-007-0044-2
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.