Commenced in January 2007
Paper Count: 31113
Another Formal Proposal For Stealth
Abstract:Taking into account the link between the efficiency of a detector and the complexity of a stealth mechanism, we propose in this paper a new formalism for stealth using graph theory.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1334544Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 920
 L. Adleman, "An abstract theory of computer viruses," in Proceedings on advances in cryptology, Crypto-88. Springer-Verlag, 1990, pp. 354- 374.
 Z. Zuo and M.-t. Zhou, "Some further theoretical results about computer viruses," The Computer Journal, vol. 47, no. 6, pp. 627-633, 2004.
 E. Filiol, Techniques virales avanc'ees. Springer Verlag France, the english version is pending (due January 2009) under the reference Advanced Computer Viruses techniques, IRIS International Series, Springer Verlag France, 2007.
 ÔÇöÔÇö, "Formal model proposal for (malware) program stealth," in Proceedings of Virus Bulletin Conference, VB2007, 2007.
 F. Cohen, "Computer viruses: Theory and experiments," Computers & Security, vol. 6, no. 1, pp. 22-35, 1987.
 K. Godel, "┬¿Uber formal unenscheidbare s┬¿atze der principia mathematica und verwandter systeme," Monatshefte fr Math. Phys, vol. 37, 1931.
 E. Filiol, Computer Viruses : from theory to applications. IRIS International Series, 2nd, Springer Verlag France, 2003.
 C. Cachin, "An information-theoretic model for steganography," Inf. Comput., vol. 192, no. 1, pp. 41-56, Mar. 2004.
 ÔÇöÔÇö, "Digital steganography," Encyclopedia of Cryptography and Security, Feb. 2005.
 M. Myers and S. Youndt, "An introduction to hardware-assisted virtual machine (hvm) rootkits," Aug. 2007.
[Online]. Available: http://crucialsecurity.com/
 C. Berge, Th'eorie des graphes et ses applications. Dunod, 1958.
 A. Bunten, "Unix and linux based rootkits techniques and countermeasures," Apr. 2004.
 K. kasslin, M. Stlahberg, S. Larvala, and A. Tikkanen, "Hide-n seek revisited - full stealth is back," 2005.
 E. Filiol, "Les virus du futur(s)," Laboratoire de virologie et de cryptologie, ESAT, Rennes, France, Oct. 2007.