Help | Advanced Search

Computer Science > Cryptography and Security

Title: computer viruses: the abstract theory revisited.

Abstract: Identifying new viral threats, and developing long term defences against current and future computer viruses, requires an understanding of their behaviour, structure and capabilities. This paper aims to advance this understanding by further developing the abstract theory of computer viruses. A method of providing abstract definitions for classes of viruses is presented in this paper, which addresses inadequacies of previous techniques. Formal definitions for some classes of viruses are then provided, which correspond to existing informal definitions. To relate the abstract theory to the real world, the connection between the abstract definitions and concrete virus implementations is examined. The use of the proposed method in studying the fundamental properties of computer viruses is discussed.

Submission history

Access paper:.

  • Other Formats

References & Citations

  • Google Scholar
  • Semantic Scholar

DBLP - CS Bibliography

Bibtex formatted citation.

BibSonomy logo

Bibliographic and Citation Tools

Code, data and media associated with this article, recommenders and search tools.

  • Institution

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .

Computer Viruses, Computer Worms, and the Self-Replication of Programs

  • First Online: 31 March 2023

Cite this chapter

research paper about computer viruses

  • Rafael Ball 2  

176 Accesses

1 Citations

Computer viruses are almost as old as computers themselves. The first technical paper about computer viruses appeared in 1984 and described a self-replicating computer program that reproduces and spreads automatically. The direct comparison and analogy-building between technical (computer) viruses and biologically effective viruses tempt us, via intentional or unintentional linguistic analogies, to see or even construct similarities in content, function, and structure between the two systems. In fact, however, we find a startling parallelism between the two systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Abts, D., & Mülder, W. (2017). Grundkurs Wirtschaftsinformatik. Eine kompakte und praxisorientierte Einführung (9., erweiterte und aktualisierte Aufl.). Springer Vieweg.

Google Scholar  

Borck, C. (2004). Vivarium des Wissens. Kleine Ontologie des Schnupfens. In R. Mayer & B. Weingart (Hrsg.), VIRUS. Mutationen einer Metapher (S. 43–61). Transcript. https://doi.org/10.14361/9783839401934-001

Brecht, W. (1995). Theoretische Informatik. Grundlagen und praktische Anwendungen . Vieweg.

Brunnstein, K. (1994). Beastware (Viren, Würmer, trojanische Pferde). Paradigmen Systemischer Unsicherheit. In J. Eberspächer (Hrsg.), Sichere Daten, sichere Kommunikation/Secure information, secure communication (Bd. 18, S. 44–60). Springer. https://doi.org/10.1007/978-3-642-85103-2_4

Cohen, F. (1984). Computer viruses – Theory and experiments. Introduction and abstract . Introduction and Abstract. https://web.eecs.umich.edu/~aprakash/eecs588/handouts/cohen-viruses.html

Fasel, D. (2014). Big Data – Eine Einführung. HMD Praxis der Wirtschaftsinformatik, 51 (4), 386–400. https://doi.org/10.1365/s40702-014-0054-8

Article   Google Scholar  

Heuveline, V. (2016, Juni 10). Virtuelle Krankmacher. Was Computerviren und ihre biologischen Gegenparts gemeinsam haben . Scinexx – das Wissensmagazin. https://www.scinexx.de/service/dossier_print_all.php?dossierID=91180

Hildt, E., & Kovacs, L. (2009). Zur Bedeutung genetischer Information. Eine Einführung. In E. Hildt & L. Kovacs (Hrsg.), Was bedeutet “genetische Information”? (S. 13 ff). de Gruyter.

Kaspersky Labs GmbH. (2021, Februar 1). Computerviren – Geschichte und Ausblick . https://www.kaspersky.de/resource-center/threats/computer-viruses-and-malware-facts-and-faqs

Kayser, F. H., Böttger, E. C., Haller, O., Deplazes, P., & Roers, A. (2014). Taschenlehrbuch Medizinische Mikrobiologie (13., vollst. überarb. und erw. Aufl.). Thieme.

Mansuy, I., Gurret, J.-M., & Lefief-Delcourt, A. (2020). Wir können unsere Gene steuern! Die Chancen der Epigenetik für ein gesundes und glückliches Leben . Berlin Verlag.

Mayer-Schönberger, V., & Cukier, K. (2013). Big Data. Die Revolution, die unser Leben verändern wird (2. Aufl.). Redline. http://deposit.d-nb.de/cgi-bin/dokserv?id=4335922&prov=M&dok_var=1&dok_ext=htm

Penzlin, H. (2016). Das Phänomen Leben. Grundfragen der Theoretischen Biologie (2., aktualisierte und erweiterte Aufl.). Springer Spektrum.

Schneider, U., & Werner, D. (Hrsg.). (2007). Taschenbuch der Informatik. Mit 108 Tabellen (6., neu bearb. Aufl.). Fachbuchverlag Leipzig im Carl-Hanser-Verl.

Download references

Author information

Authors and affiliations.

ETH Library, ETH Zurich, Zürich, Switzerland

Rafael Ball

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Rafael Ball .

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Fachmedien Wiesbaden GmbH, part of Springer Nature

About this chapter

Ball, R. (2023). Computer Viruses, Computer Worms, and the Self-Replication of Programs. In: Viruses in all Dimensions. Springer, Wiesbaden. https://doi.org/10.1007/978-3-658-38826-3_4

Download citation

DOI : https://doi.org/10.1007/978-3-658-38826-3_4

Published : 31 March 2023

Publisher Name : Springer, Wiesbaden

Print ISBN : 978-3-658-38825-6

Online ISBN : 978-3-658-38826-3

eBook Packages : Computer Science Computer Science (R0)

Share this chapter

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

To read this content please select one of the options below:

Please note you do not have access to teaching notes, an introduction to computer viruses: problems and solutions.

Library Hi Tech News

ISSN : 0741-9058

Article publication date: 14 September 2012

The purpose of this paper is to discuss various types of computer viruses, along with their characteristics, working, effects on the computer systems and to suggest measures for detecting the virus infection in a computer system and to elaborate means of prevention.

Design/methodology/approach

The author undertook an extensive study and review of the literature available online and on relevant web sites on the present topic.

A large number of viruses were found during the study, which are causing serious damages to computer systems. The author suggests ways to detect and prevent the different computer viruses.

Research limitations/implications

The research is based on and limited to the study of the relevant literature available on different relevant web sites.

Practical implications

The research will benefit business organizations, business houses, educational institutions and libraries working in fully computerized environments, in detection of viruses and preventing infection of their computer systems.

Social implications

The society will also benefit by attaining knowledge about the different types of computer viruses and the measures of prevention of infection.

Originality/value

There are a number of studies and articles available on the topic but almost all of them appear to be incomplete in the sense that either they discuss only a limited number of known viruses or suggest only limited ways of prevention. The paper has made an attempt to discuss almost all the computer viruses and every possible way of prevention of infection from them.

  • Computer viruses
  • Data security
  • Computer security
  • Information security
  • Security measures

Khan, I. (2012), "An introduction to computer viruses: problems and solutions", Library Hi Tech News , Vol. 29 No. 7, pp. 8-12. https://doi.org/10.1108/07419051211280036

Emerald Group Publishing Limited

Copyright © 2012, Emerald Group Publishing Limited

Related articles

We’re listening — tell us what you think, something didn’t work….

Report bugs here

All feedback is valuable

Please share your general feedback

Join us on our journey

Platform update page.

Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

Questions & More Information

Answers to the most commonly asked questions here

Computer viruses

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

A Study on Hazards of Computer Viruses

Computer use is becoming part of our lives every other day however there have been considerable threats of computer viruses in the recent past. Viruses have had adverse effects on data and programs ranging from formatting hard disks, damaging information infrastructure, suddenly restarting machines, deleting or modifying data and in some cases mild effects such as slowing down machines or producing irritating sounds. Viruses have been a major cause for worry especially with the advances in data processing, storage and movement of information technologically. Many computer users and organizations especially the computer intensive organizations have had to invest heavily in dealing with viruses particularly those organizations running the windows platform. These computer viruses have been defined by their characteristics of entry and multiplication without the user’s notice as well as diverting the normal functioning of the computer. This paper seeks to define a virus and explain its related terms such as malicious software, worms, and Trojan horses. It explains vulnerabilities of operating systems in relation to viruses, it makes an observation on strengths of Linux versus Windows, outline the present state of affairs, apart from using anti-virus software, there are other procedures which can help protect against viruses which are also mentioned, the future of computer viruses and the conclusion that the Internet is serving its purpose of interconnecting computer and hence promoting distribution of viruses then makes some recommendations on viruses.

  • Related Documents

Discovering Computer Security Awareness Levels Among U.S. and Chinese Computer Users

Despite the recent increased attention afforded malware by the popular press, there appears to be a dearth in user awareness and understanding of certain aspects of the security paradigm. This chapter presents a comparison of user awareness levels of rootkits, spyware, and viruses between U.S. and Chinese users. The results of a survey of 210 U.S. respondents and 278 Chinese respondents indicate that respondents’ awareness and knowledge of rootkits is well below that of spyware and viruses. Data analysis further reveals that there are significant differences in Chinese and U.S. user perceptions with regard to spyware and computer viruses. However, there is no difference in cross-cultural awareness with regard to rootkits. Due to the ubiquitous nature of the Internet, rootkits and other malware do not yield at transnational borders. An important step to mitigate the threats posed by malware such as rootkits is to raise awareness levels of users worldwide.

INTERNET-BASED PROJECT WORK// Social Sciences: Achievements and Prospects Journal 4(12), 2019/ OEAPS Inc.(Open European Academy of Public Sciences); Chief Editor Mark Freeman - Barcelona, Spain. 16.05.2019: OEAPS Inc., 2019. - pp. 34-40.

Some words about attitudes to technology: many people are afraid of new technology and, with the increasing presence of the Internet and computers, the term technophobe has appeared to refer to those of us who might be wary of these new developments. More recently, the term digital native has been coined to refer to someone who grows up using technology, and who thus feels comfortable and confident with it there is a tendency to call computer users either technophobes or technogeeks ( a term for a technology enthusiast) the truth is that most of us probably fall somewhere between the two extremes. A large part of the negative attitudes teachers have towards technology is usually the result of a lack of confidence, a lack of facilities or a lack of training, resulting in an inability to see the benefit of using technologies in the classroom. It is also often the case that teachers may not be fully in control of their work situations. A teacher may want to use more technology in their teaching, but the school may not have the facilities, or, on the other hand, a teacher may be instructed to start using technology for which they feel unprepared or untrained.

Options for putting CDS/ISIS databases on the internet

PurposeTo review the variety of software solutions available for putting CDS/ISIS databases on the internet. To help anyone considering which route to take.Design/methodology/approachBriefly describes the characteristics, history, origin and availability of each package. Identifies the type of skills required to implement the package and the kind of application it is suited to. Covers CDS/ISIS Unix version, JavaISIS, IsisWWW, WWWISIS Versions 3 and 5, Genisis, IAH, WWW‐ISIS, and OpenIsis.FindingsThere is no obvious single “best” solution. Several are free but may require more investment in acquiring the skills to install and configure them. The choice will depend on the user's experience with CDS/ISIS formatting language, HTML, programming languages, operating systems, open source software, and so on.Originality/valueThere is detailed documentation available for most of these packages, but little previous guidance to help potential users to distinguish and choose between them.

A Normative Framework for Sharing Information Online

People have always shared information through chains and networks of testimony. It is arguably part of what makes us human and enables us to live in cooperative communities with populations greater than 150 or so. The invention of the internet and the rise of social media have turbocharged our ability to share information. This chapter develops a normative epistemic framework for sharing information online. This framework takes into account both ethical and epistemic considerations that are intertwined in typical cases of online testimony. The authors argue that, while the current state of affairs is not entirely novel, recent technological developments call for a rethinking of the norms of testimony, as well as the articulation of a set of virtuous dispositions that people would do well to cultivate in their capacity as conduits (not just sources or receivers) of information.

How Do Home Computer Users Browse the Web?

With the ubiquity of web tracking, information on how people navigate the internet is abundantly collected yet, due to its proprietary nature, rarely distributed. As a result, our understanding of user browsing primarily derives from small-scale studies conducted more than a decade ago. To provide an broader updated perspective, we analyze data from 257 participants who consented to have their home computer and browsing behavior monitored through the Security Behavior Observatory. Compared to previous work, we find a substantial increase in tabbed browsing and demonstrate the need to include tab information for accurate web measurements. Our results confirm that user browsing is highly centralized, with 50% of internet use spent on 1% of visited websites. However, we also find that users spend a disproportionate amount of time on low-visited websites, areas with a greater likelihood of containing risky content. We then identify the primary gateways to these sites and discuss implications for future research.

Anti-WebShell PHP Backdoor Scanner pada Linux Server

Backdoor or commonly also known as web shell is one of the malicious software that hackers use to maintain access systems that they have entered. Relatively few programs like Anti Web-Shell, PHP Backdoor Scanner circulating on the Internet, and can be obtained free of charge to deal with the issues above. But most of these programs have no actual database of signature behavior to deal with PHP backdoor / Shell nowadays. Then comes the contemporary Anti Web-Shell program that can deal with today's backdoor shell. This study uses an experimental method concerning previous similar studies and is implemented directly into the world of cyber security professional industries. By enriching the Regex dictionary signature and String Array Matching the actualized Anti Web-Shell program can detect more backdoor than similar programs that have existed in the past. The results of this study are in the form of a web application software in PHP extension. The application can minimize 100% of false positives and is twice as fast in scanning files because it is more specific in heuristic analysis scan.

The Impact of Operating System on Bandwidth in Open VPN Technology

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will be generated by the server. An authentication and key exchange will be based on standard protocol SSL/TLS. Various operating systems from open source and windows will be used. Each operating system uses a different hardware specification. Tools such as tcpdump and jperf will be used to verify and measure the connectivity and performance. OpenVPN in the LAN is based on the type of operating system, portability and straightforward implementation. The bandwidth which is captured in this experiment is influenced by the operating system rather than the memory and capacity of the hard disk. Relationship and interoperability between each peer and server will be discussed. At the same time privacy for the user in the LAN can be introduced with a minimum specification.

Computer Virus Models and Analysis in M-Health IT Systems

Computer viruses have been studied for a long time both by the research and by the application communities. As computer networks and the Internet became more popular from the late 1980s on, viruses quickly evolved to be able to spread through the Internet by various means such as file downloading, email, exploiting security holes in software, etc. Epidemiological models have traditionally been used to understand and predict the outcome of virus outbreaks in human or animal populations. However, the same models were recently applied to the analysis of computer virus epidemics. In this work we present various computer virus spread models combined with applications to e-health systems.

Open Source Survey Software

One of the significant advances in software design afforded by the internet has been the open source movement, an effort to collaboratively create software and make it widely and freely available to the online community. Although the open source movement started with Unix-like computer operating systems, it has expanded to include a wide variety of software programs, including tools to publish and analyze online surveys. This article introduces the open source movement and then profiles three leading open source survey programs: php Easy Survey Package (phpESP), PHP Surveyor, and the Moodle course management system.

Information Security as a Community of Practice

This entry concerns a live application in which the principles of communities of practice have been used to supplement the delivery of a critical business process. The company concerned is a multinational pharmaceutical organization with annual sales in the order of £20bn and a workforce of 100,000 employees worldwide. One of the more critical IT services provided is that which defends the organisation’s computer systems against attack by malicious software (commonly called computer viruses). This service draws significant direct and indirect resources to provide an acceptable level of defence for the organization. The service manages the provision of this defence from the gathering of intelligence concerning latest threats through deployment of protective measures to reporting of metrics showing service performance and adequacy of defences.

Export Citation Format

Share document.

COMMENTS

  1. (PDF) The Impact of Computer Virus

    This paper presents a general overview on evolution of concealment methods in computer viruses and defensive techniques employed by anti-virus products.

  2. computer viruses Latest Research Papers

    This study aims to model the pattern of the spread of computer viruses. The method used in this research is the analytical method with the probability of mathematical immunity. Based on the analysis of the model, two equilibrium points free from disease E1 and endemic equilibrium points E2 were obtained.

  3. Computer viruses: What they are, how they work, how they ...

    A computer virus is a program that replicates itself and spreads to computers with the goal of disrupting or destroying normal computer use. In academic computing, viruses represent a serious problem that costs millions of dollars in losses annually and hinders the free exchange of information so critical to education. Viruses operate in incubation, infection, and destroy phases. The nature ...

  4. The spread of computer viruses over a reduced scale-free network

    The major objective of this paper is to understand the spread of computer viruses on a reduced scale-free network. For that purpose, we propose a novel epidemic model of computer viruses. ... The Art of Computer Virus Research and Defense. Addison-Wesley Education Publishers Inc. (2005) Google Scholar [2] F. Cohen. Computer viruses: theory and ...

  5. [1912.06510] Computer Viruses: The Abstract Theory Revisited

    Download PDF Abstract: Identifying new viral threats, and developing long term defences against current and future computer viruses, requires an understanding of their behaviour, structure and capabilities. This paper aims to advance this understanding by further developing the abstract theory of computer viruses. A method of providing abstract definitions for classes of viruses is presented ...

  6. Computer Viruses, Computer Worms, and the Self-Replication ...

    Computer viruses are almost as old as computers themselves. The first technical paper about computer viruses appeared in 1984 and described a self-replicating computer program that reproduces and spreads automatically. The direct comparison and analogy-building between technical (computer) viruses and biologically effective viruses tempt us ...

  7. Decoding the World of Computer Viruses: Types and Proactive ...

    Following the identification of common causes of computer virus assaults, potential remedies are sent to home computer users in an effort to help them combat these attacks and enhance their computer usage going ahead. This research focuses on the stages of computer viruses, their history, working principles and how to prevent them.

  8. An introduction to computer viruses: problems and solutions

    - The purpose of this paper is to discuss various types of computer viruses, along with their characteristics, working, effects on the computer systems and to suggest measures for detecting the virus infection in a computer system and to elaborate means of prevention., - The author undertook an extensive study and review of the literature ...

  9. Viruses, Computer

    Abstract. Viruses can be defined simply as self-replicating programs; however, viruses continue to be maliciously combined with cybercrime, which has become rampant as society grows more dependent on information systems. Most organizations cannot handle the viruses that are reported every day on their own, because these viruses have developed ...

  10. A Comprehensive Study on Malware Detection and Prevention Techniques

    This paper aims to explain and discuss advanced technology used by anti-virus. In this era of the digital world, technology is developing rapidly day by day. Along with technology, Along with the development, cyber risk also increasing; thousands of cyber attacks are taking place every day. Malware (Viruses, worms, Trojans, rootkits, ransomware, Adware, Spyware) is one of the most common cyber ...

  11. Research paper A comprehensive review study of cyber-attacks and cyber

    A virus is a self-replicating program that spreads to other documents and other programs by duplicating itself, and may cause programs to malfunction. A computer virus acts like a biological virus that spreads through its reproduction to cells in the host body. Some of the popular viruses are: NIMDA, SLAMMER, and SASSER. Hacker

  12. An Overview of Computer Viruses in a Research Environment

    The threat of attack by computer viruses is in reality a very small part of a much more general threat, specifically attacks aimed at subverting computer security. This paper examines computer viruses as malicious logic in a research and development environment, relates them to various models of security and integrity, and examines current ...

  13. Computer viruses

    Computer viruses have been around since the mid 1980s. Over 40,000 different viruses have been cataloged so far and the number of viruses is increasing dramatically. The damage they cause is estimated to be several billions of U.S. dollars per year. Most often, the origin of the virus is difficult to trace. Various kinds of anti-virus software have been developed which detect viruses and take ...

  14. Computer Viruses: Principles of Exertion, Occurrence and Awareness

    Computer users, including students, home and corporate users, system administrators, corporate managers, and even the antivirus manufacturers. People with malefic intentions write the viruses to bother innocent users. Many sorts of viruses are boot sector viruses, file viruses, worms, Trojan horses, macro viruses, etc.

  15. A Study on Hazards of Computer Viruses

    A Study on Hazards of Computer Viruses. International Journal of Advanced Research in Science, Communication and Technology . 10.48175/ijarsct-2107 . 2021 . pp. 206-210. Author (s): Jaishma Kumari B . Sathwik U Shetty . Pushvin Gowda .

  16. Viruses: Impact on Science and Society

    Abstract. We examine the inter-relationships between viruses and human society. Following a short discussion of the etymology of the word "virus", we consider the mutual impact of viruses and science, including the relationship between technological developments and virus discovery, advances in other biomedical sciences gained through ...

  17. Detection of Virus Using Artificial Intelligence and Machine ...

    This paper is devoted, to study of recent viruses, detection and prediction of viruses using AI and Machine Learning Techniques. Recently in December 2019 a new virus was discovered named coronavirus. So, to detect this type of viruses in the future and present, we can use AI and Machine Learning concepts for the detection of viruses.

  18. USDA

    Access the portal of NASS, the official source of agricultural data and statistics in the US, and explore various reports and products.