Darwin inside the machines: Malware evolution and the consequences for computer security

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

13 pages

Scientific paper

Recent advances in anti-malware technologies have steered the security industry away from maintaining vast signature databases and into newer defence technologies such as behaviour blocking, application whitelisting and others. Most would agree that the reasoning behind this is to keep up with the arms race established between malware writers and the security community almost three decades ago. Still, malware writers have not as yet created new paradigms. Indeed, malicious code development is still largely limited to code pattern changes utilizing polymorphic and metamorphic engines, as well as executable packer and wrapper technologies. Each new malware instance retains the exact same core functionality as its ancestor and only alters the way it looks. What if, instead, malware were able to change its function or behaviour autonomously? What if, in the absence of human intervention, computer viruses resembled biological viruses in their ability to adapt to new defence technologies as soon as they came into effect? In this paper, we will provide the theoretical proof behind malware implementation that closely models Darwinian evolution.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Darwin inside the machines: Malware evolution and the consequences for computer security does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Darwin inside the machines: Malware evolution and the consequences for computer security, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Darwin inside the machines: Malware evolution and the consequences for computer security will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-727908

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.