Computer Science – Cryptography and Security
Scientific paper
2011-11-10
Proceedings of Virus Bulletin Conference 2008 (Ottawa), H. Martin ed., pp. 187-194
Computer Science
Cryptography and Security
13 pages
Scientific paper
Recent advances in anti-malware technologies have steered the security industry away from maintaining vast signature databases and into newer defence technologies such as behaviour blocking, application whitelisting and others. Most would agree that the reasoning behind this is to keep up with the arms race established between malware writers and the security community almost three decades ago. Still, malware writers have not as yet created new paradigms. Indeed, malicious code development is still largely limited to code pattern changes utilizing polymorphic and metamorphic engines, as well as executable packer and wrapper technologies. Each new malware instance retains the exact same core functionality as its ancestor and only alters the way it looks. What if, instead, malware were able to change its function or behaviour autonomously? What if, in the absence of human intervention, computer viruses resembled biological viruses in their ability to adapt to new defence technologies as soon as they came into effect? In this paper, we will provide the theoretical proof behind malware implementation that closely models Darwinian evolution.
Adami Chris
Iliopoulos Dimitris
Szor P.
No associations
LandOfFree
Darwin inside the machines: Malware evolution and the consequences for computer security does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Darwin inside the machines: Malware evolution and the consequences for computer security, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Darwin inside the machines: Malware evolution and the consequences for computer security will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-727908