Formalisation and implementation aspects of K-ary (malicious) codes

29Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper presents a new class of (malicious) codes denoted k-ary codes. Instead of containing the whole instructions composing the program's action, this type of codes is composed of k distinct parts which constitute a partition of the entire code. Each of these parts contains only a subset of the instructions. When considered alone (e.g. by an antivirus) every part cannot be distinguished from a normal uninfected program while their respective action combined according to different possible modes results in the offensive behaviour. In this paper, we presents a formalisation of this type of codes by means of Boolean functions and give their detailed taxonomy. We first show that classical malware are just a particular instance of this general model then we specifically address the case of k-ary codes. We give some complexity results about their detection based on the interaction between the different parts. As a general result, the detection is proved to be NP-complete. © Springer-Verlag France 2007.

Cite

CITATION STYLE

APA

Filiol, E. (2007). Formalisation and implementation aspects of K-ary (malicious) codes. Journal in Computer Virology, 3(2), 75–86. https://doi.org/10.1007/s11416-007-0044-2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free