Help | Advanced Search
Computer Science > Cryptography and Security
Title: computer viruses: the abstract theory revisited.
Abstract: Identifying new viral threats, and developing long term defences against current and future computer viruses, requires an understanding of their behaviour, structure and capabilities. This paper aims to advance this understanding by further developing the abstract theory of computer viruses. A method of providing abstract definitions for classes of viruses is presented in this paper, which addresses inadequacies of previous techniques. Formal definitions for some classes of viruses are then provided, which correspond to existing informal definitions. To relate the abstract theory to the real world, the connection between the abstract definitions and concrete virus implementations is examined. The use of the proposed method in studying the fundamental properties of computer viruses is discussed.
Submission history
Access paper:.
- Other Formats
References & Citations
- Google Scholar
- Semantic Scholar
DBLP - CS Bibliography
Bibtex formatted citation.
Bibliographic and Citation Tools
Code, data and media associated with this article, recommenders and search tools.
- Institution
arXivLabs: experimental projects with community collaborators
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.
Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .
Computer Viruses, Computer Worms, and the Self-Replication of Programs
- First Online: 31 March 2023
Cite this chapter
- Rafael Ball 2
176 Accesses
1 Citations
Computer viruses are almost as old as computers themselves. The first technical paper about computer viruses appeared in 1984 and described a self-replicating computer program that reproduces and spreads automatically. The direct comparison and analogy-building between technical (computer) viruses and biologically effective viruses tempt us, via intentional or unintentional linguistic analogies, to see or even construct similarities in content, function, and structure between the two systems. In fact, however, we find a startling parallelism between the two systems.
This is a preview of subscription content, log in via an institution to check access.
Access this chapter
- Available as EPUB and PDF
- Read on any device
- Instant download
- Own it forever
- Compact, lightweight edition
- Dispatched in 3 to 5 business days
- Free shipping worldwide - see info
Tax calculation will be finalised at checkout
Purchases are for personal use only
Institutional subscriptions
Abts, D., & Mülder, W. (2017). Grundkurs Wirtschaftsinformatik. Eine kompakte und praxisorientierte Einführung (9., erweiterte und aktualisierte Aufl.). Springer Vieweg.
Google Scholar
Borck, C. (2004). Vivarium des Wissens. Kleine Ontologie des Schnupfens. In R. Mayer & B. Weingart (Hrsg.), VIRUS. Mutationen einer Metapher (S. 43–61). Transcript. https://doi.org/10.14361/9783839401934-001
Brecht, W. (1995). Theoretische Informatik. Grundlagen und praktische Anwendungen . Vieweg.
Brunnstein, K. (1994). Beastware (Viren, Würmer, trojanische Pferde). Paradigmen Systemischer Unsicherheit. In J. Eberspächer (Hrsg.), Sichere Daten, sichere Kommunikation/Secure information, secure communication (Bd. 18, S. 44–60). Springer. https://doi.org/10.1007/978-3-642-85103-2_4
Cohen, F. (1984). Computer viruses – Theory and experiments. Introduction and abstract . Introduction and Abstract. https://web.eecs.umich.edu/~aprakash/eecs588/handouts/cohen-viruses.html
Fasel, D. (2014). Big Data – Eine Einführung. HMD Praxis der Wirtschaftsinformatik, 51 (4), 386–400. https://doi.org/10.1365/s40702-014-0054-8
Article Google Scholar
Heuveline, V. (2016, Juni 10). Virtuelle Krankmacher. Was Computerviren und ihre biologischen Gegenparts gemeinsam haben . Scinexx – das Wissensmagazin. https://www.scinexx.de/service/dossier_print_all.php?dossierID=91180
Hildt, E., & Kovacs, L. (2009). Zur Bedeutung genetischer Information. Eine Einführung. In E. Hildt & L. Kovacs (Hrsg.), Was bedeutet “genetische Information”? (S. 13 ff). de Gruyter.
Kaspersky Labs GmbH. (2021, Februar 1). Computerviren – Geschichte und Ausblick . https://www.kaspersky.de/resource-center/threats/computer-viruses-and-malware-facts-and-faqs
Kayser, F. H., Böttger, E. C., Haller, O., Deplazes, P., & Roers, A. (2014). Taschenlehrbuch Medizinische Mikrobiologie (13., vollst. überarb. und erw. Aufl.). Thieme.
Mansuy, I., Gurret, J.-M., & Lefief-Delcourt, A. (2020). Wir können unsere Gene steuern! Die Chancen der Epigenetik für ein gesundes und glückliches Leben . Berlin Verlag.
Mayer-Schönberger, V., & Cukier, K. (2013). Big Data. Die Revolution, die unser Leben verändern wird (2. Aufl.). Redline. http://deposit.d-nb.de/cgi-bin/dokserv?id=4335922&prov=M&dok_var=1&dok_ext=htm
Penzlin, H. (2016). Das Phänomen Leben. Grundfragen der Theoretischen Biologie (2., aktualisierte und erweiterte Aufl.). Springer Spektrum.
Schneider, U., & Werner, D. (Hrsg.). (2007). Taschenbuch der Informatik. Mit 108 Tabellen (6., neu bearb. Aufl.). Fachbuchverlag Leipzig im Carl-Hanser-Verl.
Download references
Author information
Authors and affiliations.
ETH Library, ETH Zurich, Zürich, Switzerland
Rafael Ball
You can also search for this author in PubMed Google Scholar
Corresponding author
Correspondence to Rafael Ball .
Rights and permissions
Reprints and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Fachmedien Wiesbaden GmbH, part of Springer Nature
About this chapter
Ball, R. (2023). Computer Viruses, Computer Worms, and the Self-Replication of Programs. In: Viruses in all Dimensions. Springer, Wiesbaden. https://doi.org/10.1007/978-3-658-38826-3_4
Download citation
DOI : https://doi.org/10.1007/978-3-658-38826-3_4
Published : 31 March 2023
Publisher Name : Springer, Wiesbaden
Print ISBN : 978-3-658-38825-6
Online ISBN : 978-3-658-38826-3
eBook Packages : Computer Science Computer Science (R0)
Share this chapter
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative
- Publish with us
Policies and ethics
- Find a journal
- Track your research
To read this content please select one of the options below:
Please note you do not have access to teaching notes, an introduction to computer viruses: problems and solutions.
Library Hi Tech News
ISSN : 0741-9058
Article publication date: 14 September 2012
The purpose of this paper is to discuss various types of computer viruses, along with their characteristics, working, effects on the computer systems and to suggest measures for detecting the virus infection in a computer system and to elaborate means of prevention.
Design/methodology/approach
The author undertook an extensive study and review of the literature available online and on relevant web sites on the present topic.
A large number of viruses were found during the study, which are causing serious damages to computer systems. The author suggests ways to detect and prevent the different computer viruses.
Research limitations/implications
The research is based on and limited to the study of the relevant literature available on different relevant web sites.
Practical implications
The research will benefit business organizations, business houses, educational institutions and libraries working in fully computerized environments, in detection of viruses and preventing infection of their computer systems.
Social implications
The society will also benefit by attaining knowledge about the different types of computer viruses and the measures of prevention of infection.
Originality/value
There are a number of studies and articles available on the topic but almost all of them appear to be incomplete in the sense that either they discuss only a limited number of known viruses or suggest only limited ways of prevention. The paper has made an attempt to discuss almost all the computer viruses and every possible way of prevention of infection from them.
- Computer viruses
- Data security
- Computer security
- Information security
- Security measures
Khan, I. (2012), "An introduction to computer viruses: problems and solutions", Library Hi Tech News , Vol. 29 No. 7, pp. 8-12. https://doi.org/10.1108/07419051211280036
Emerald Group Publishing Limited
Copyright © 2012, Emerald Group Publishing Limited
Related articles
We’re listening — tell us what you think, something didn’t work….
Report bugs here
All feedback is valuable
Please share your general feedback
Join us on our journey
Platform update page.
Visit emeraldpublishing.com/platformupdate to discover the latest news and updates
Questions & More Information
Answers to the most commonly asked questions here
Computer viruses
Ieee account.
- Change Username/Password
- Update Address
Purchase Details
- Payment Options
- Order History
- View Purchased Documents
Profile Information
- Communications Preferences
- Profession and Education
- Technical Interests
- US & Canada: +1 800 678 4333
- Worldwide: +1 732 981 0060
- Contact & Support
- About IEEE Xplore
- Accessibility
- Terms of Use
- Nondiscrimination Policy
- Privacy & Opting Out of Cookies
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.
A Study on Hazards of Computer Viruses
Computer use is becoming part of our lives every other day however there have been considerable threats of computer viruses in the recent past. Viruses have had adverse effects on data and programs ranging from formatting hard disks, damaging information infrastructure, suddenly restarting machines, deleting or modifying data and in some cases mild effects such as slowing down machines or producing irritating sounds. Viruses have been a major cause for worry especially with the advances in data processing, storage and movement of information technologically. Many computer users and organizations especially the computer intensive organizations have had to invest heavily in dealing with viruses particularly those organizations running the windows platform. These computer viruses have been defined by their characteristics of entry and multiplication without the user’s notice as well as diverting the normal functioning of the computer. This paper seeks to define a virus and explain its related terms such as malicious software, worms, and Trojan horses. It explains vulnerabilities of operating systems in relation to viruses, it makes an observation on strengths of Linux versus Windows, outline the present state of affairs, apart from using anti-virus software, there are other procedures which can help protect against viruses which are also mentioned, the future of computer viruses and the conclusion that the Internet is serving its purpose of interconnecting computer and hence promoting distribution of viruses then makes some recommendations on viruses.
- Related Documents
Discovering Computer Security Awareness Levels Among U.S. and Chinese Computer Users
Despite the recent increased attention afforded malware by the popular press, there appears to be a dearth in user awareness and understanding of certain aspects of the security paradigm. This chapter presents a comparison of user awareness levels of rootkits, spyware, and viruses between U.S. and Chinese users. The results of a survey of 210 U.S. respondents and 278 Chinese respondents indicate that respondents’ awareness and knowledge of rootkits is well below that of spyware and viruses. Data analysis further reveals that there are significant differences in Chinese and U.S. user perceptions with regard to spyware and computer viruses. However, there is no difference in cross-cultural awareness with regard to rootkits. Due to the ubiquitous nature of the Internet, rootkits and other malware do not yield at transnational borders. An important step to mitigate the threats posed by malware such as rootkits is to raise awareness levels of users worldwide.
INTERNET-BASED PROJECT WORK// Social Sciences: Achievements and Prospects Journal 4(12), 2019/ OEAPS Inc.(Open European Academy of Public Sciences); Chief Editor Mark Freeman - Barcelona, Spain. 16.05.2019: OEAPS Inc., 2019. - pp. 34-40.
Some words about attitudes to technology: many people are afraid of new technology and, with the increasing presence of the Internet and computers, the term technophobe has appeared to refer to those of us who might be wary of these new developments. More recently, the term digital native has been coined to refer to someone who grows up using technology, and who thus feels comfortable and confident with it there is a tendency to call computer users either technophobes or technogeeks ( a term for a technology enthusiast) the truth is that most of us probably fall somewhere between the two extremes. A large part of the negative attitudes teachers have towards technology is usually the result of a lack of confidence, a lack of facilities or a lack of training, resulting in an inability to see the benefit of using technologies in the classroom. It is also often the case that teachers may not be fully in control of their work situations. A teacher may want to use more technology in their teaching, but the school may not have the facilities, or, on the other hand, a teacher may be instructed to start using technology for which they feel unprepared or untrained.
Options for putting CDS/ISIS databases on the internet
PurposeTo review the variety of software solutions available for putting CDS/ISIS databases on the internet. To help anyone considering which route to take.Design/methodology/approachBriefly describes the characteristics, history, origin and availability of each package. Identifies the type of skills required to implement the package and the kind of application it is suited to. Covers CDS/ISIS Unix version, JavaISIS, IsisWWW, WWWISIS Versions 3 and 5, Genisis, IAH, WWW‐ISIS, and OpenIsis.FindingsThere is no obvious single “best” solution. Several are free but may require more investment in acquiring the skills to install and configure them. The choice will depend on the user's experience with CDS/ISIS formatting language, HTML, programming languages, operating systems, open source software, and so on.Originality/valueThere is detailed documentation available for most of these packages, but little previous guidance to help potential users to distinguish and choose between them.
A Normative Framework for Sharing Information Online
People have always shared information through chains and networks of testimony. It is arguably part of what makes us human and enables us to live in cooperative communities with populations greater than 150 or so. The invention of the internet and the rise of social media have turbocharged our ability to share information. This chapter develops a normative epistemic framework for sharing information online. This framework takes into account both ethical and epistemic considerations that are intertwined in typical cases of online testimony. The authors argue that, while the current state of affairs is not entirely novel, recent technological developments call for a rethinking of the norms of testimony, as well as the articulation of a set of virtuous dispositions that people would do well to cultivate in their capacity as conduits (not just sources or receivers) of information.
How Do Home Computer Users Browse the Web?
With the ubiquity of web tracking, information on how people navigate the internet is abundantly collected yet, due to its proprietary nature, rarely distributed. As a result, our understanding of user browsing primarily derives from small-scale studies conducted more than a decade ago. To provide an broader updated perspective, we analyze data from 257 participants who consented to have their home computer and browsing behavior monitored through the Security Behavior Observatory. Compared to previous work, we find a substantial increase in tabbed browsing and demonstrate the need to include tab information for accurate web measurements. Our results confirm that user browsing is highly centralized, with 50% of internet use spent on 1% of visited websites. However, we also find that users spend a disproportionate amount of time on low-visited websites, areas with a greater likelihood of containing risky content. We then identify the primary gateways to these sites and discuss implications for future research.
Anti-WebShell PHP Backdoor Scanner pada Linux Server
Backdoor or commonly also known as web shell is one of the malicious software that hackers use to maintain access systems that they have entered. Relatively few programs like Anti Web-Shell, PHP Backdoor Scanner circulating on the Internet, and can be obtained free of charge to deal with the issues above. But most of these programs have no actual database of signature behavior to deal with PHP backdoor / Shell nowadays. Then comes the contemporary Anti Web-Shell program that can deal with today's backdoor shell. This study uses an experimental method concerning previous similar studies and is implemented directly into the world of cyber security professional industries. By enriching the Regex dictionary signature and String Array Matching the actualized Anti Web-Shell program can detect more backdoor than similar programs that have existed in the past. The results of this study are in the form of a web application software in PHP extension. The application can minimize 100% of false positives and is twice as fast in scanning files because it is more specific in heuristic analysis scan.
The Impact of Operating System on Bandwidth in Open VPN Technology
The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will be generated by the server. An authentication and key exchange will be based on standard protocol SSL/TLS. Various operating systems from open source and windows will be used. Each operating system uses a different hardware specification. Tools such as tcpdump and jperf will be used to verify and measure the connectivity and performance. OpenVPN in the LAN is based on the type of operating system, portability and straightforward implementation. The bandwidth which is captured in this experiment is influenced by the operating system rather than the memory and capacity of the hard disk. Relationship and interoperability between each peer and server will be discussed. At the same time privacy for the user in the LAN can be introduced with a minimum specification.
Computer Virus Models and Analysis in M-Health IT Systems
Computer viruses have been studied for a long time both by the research and by the application communities. As computer networks and the Internet became more popular from the late 1980s on, viruses quickly evolved to be able to spread through the Internet by various means such as file downloading, email, exploiting security holes in software, etc. Epidemiological models have traditionally been used to understand and predict the outcome of virus outbreaks in human or animal populations. However, the same models were recently applied to the analysis of computer virus epidemics. In this work we present various computer virus spread models combined with applications to e-health systems.
Open Source Survey Software
One of the significant advances in software design afforded by the internet has been the open source movement, an effort to collaboratively create software and make it widely and freely available to the online community. Although the open source movement started with Unix-like computer operating systems, it has expanded to include a wide variety of software programs, including tools to publish and analyze online surveys. This article introduces the open source movement and then profiles three leading open source survey programs: php Easy Survey Package (phpESP), PHP Surveyor, and the Moodle course management system.
Information Security as a Community of Practice
This entry concerns a live application in which the principles of communities of practice have been used to supplement the delivery of a critical business process. The company concerned is a multinational pharmaceutical organization with annual sales in the order of £20bn and a workforce of 100,000 employees worldwide. One of the more critical IT services provided is that which defends the organisation’s computer systems against attack by malicious software (commonly called computer viruses). This service draws significant direct and indirect resources to provide an acceptable level of defence for the organization. The service manages the provision of this defence from the gathering of intelligence concerning latest threats through deployment of protective measures to reporting of metrics showing service performance and adequacy of defences.
Export Citation Format
Share document.
COMMENTS
This paper presents a general overview on evolution of concealment methods in computer viruses and defensive techniques employed by anti-virus products.
This study aims to model the pattern of the spread of computer viruses. The method used in this research is the analytical method with the probability of mathematical immunity. Based on the analysis of the model, two equilibrium points free from disease E1 and endemic equilibrium points E2 were obtained.
A computer virus is a program that replicates itself and spreads to computers with the goal of disrupting or destroying normal computer use. In academic computing, viruses represent a serious problem that costs millions of dollars in losses annually and hinders the free exchange of information so critical to education. Viruses operate in incubation, infection, and destroy phases. The nature ...
The major objective of this paper is to understand the spread of computer viruses on a reduced scale-free network. For that purpose, we propose a novel epidemic model of computer viruses. ... The Art of Computer Virus Research and Defense. Addison-Wesley Education Publishers Inc. (2005) Google Scholar [2] F. Cohen. Computer viruses: theory and ...
Download PDF Abstract: Identifying new viral threats, and developing long term defences against current and future computer viruses, requires an understanding of their behaviour, structure and capabilities. This paper aims to advance this understanding by further developing the abstract theory of computer viruses. A method of providing abstract definitions for classes of viruses is presented ...
Computer viruses are almost as old as computers themselves. The first technical paper about computer viruses appeared in 1984 and described a self-replicating computer program that reproduces and spreads automatically. The direct comparison and analogy-building between technical (computer) viruses and biologically effective viruses tempt us ...
Following the identification of common causes of computer virus assaults, potential remedies are sent to home computer users in an effort to help them combat these attacks and enhance their computer usage going ahead. This research focuses on the stages of computer viruses, their history, working principles and how to prevent them.
- The purpose of this paper is to discuss various types of computer viruses, along with their characteristics, working, effects on the computer systems and to suggest measures for detecting the virus infection in a computer system and to elaborate means of prevention., - The author undertook an extensive study and review of the literature ...
Abstract. Viruses can be defined simply as self-replicating programs; however, viruses continue to be maliciously combined with cybercrime, which has become rampant as society grows more dependent on information systems. Most organizations cannot handle the viruses that are reported every day on their own, because these viruses have developed ...
This paper aims to explain and discuss advanced technology used by anti-virus. In this era of the digital world, technology is developing rapidly day by day. Along with technology, Along with the development, cyber risk also increasing; thousands of cyber attacks are taking place every day. Malware (Viruses, worms, Trojans, rootkits, ransomware, Adware, Spyware) is one of the most common cyber ...
A virus is a self-replicating program that spreads to other documents and other programs by duplicating itself, and may cause programs to malfunction. A computer virus acts like a biological virus that spreads through its reproduction to cells in the host body. Some of the popular viruses are: NIMDA, SLAMMER, and SASSER. Hacker
The threat of attack by computer viruses is in reality a very small part of a much more general threat, specifically attacks aimed at subverting computer security. This paper examines computer viruses as malicious logic in a research and development environment, relates them to various models of security and integrity, and examines current ...
Computer viruses have been around since the mid 1980s. Over 40,000 different viruses have been cataloged so far and the number of viruses is increasing dramatically. The damage they cause is estimated to be several billions of U.S. dollars per year. Most often, the origin of the virus is difficult to trace. Various kinds of anti-virus software have been developed which detect viruses and take ...
Computer users, including students, home and corporate users, system administrators, corporate managers, and even the antivirus manufacturers. People with malefic intentions write the viruses to bother innocent users. Many sorts of viruses are boot sector viruses, file viruses, worms, Trojan horses, macro viruses, etc.
A Study on Hazards of Computer Viruses. International Journal of Advanced Research in Science, Communication and Technology . 10.48175/ijarsct-2107 . 2021 . pp. 206-210. Author (s): Jaishma Kumari B . Sathwik U Shetty . Pushvin Gowda .
Abstract. We examine the inter-relationships between viruses and human society. Following a short discussion of the etymology of the word "virus", we consider the mutual impact of viruses and science, including the relationship between technological developments and virus discovery, advances in other biomedical sciences gained through ...
This paper is devoted, to study of recent viruses, detection and prediction of viruses using AI and Machine Learning Techniques. Recently in December 2019 a new virus was discovered named coronavirus. So, to detect this type of viruses in the future and present, we can use AI and Machine Learning concepts for the detection of viruses.
Access the portal of NASS, the official source of agricultural data and statistics in the US, and explore various reports and products.