2009
DOI: 10.1007/s11416-009-0137-1
|View full text |Cite
|
Sign up to set email alerts
|

A general definition of malware

Abstract: We propose a general, formal definition of the concept of malware (malicious software) as a single sentence in the language of a certain modal logic. Our definition is general thanks to its abstract formulation, which, being abstract, is independent of-but nonetheless generally applicable to-the manifold concrete manifestations of malware. From our formulation of malware, we derive equally general and formal definitions of benware (benign software), anti-malware ("antibodies" against malware), and medware (med… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
24
0
3

Year Published

2013
2013
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 60 publications
(27 citation statements)
references
References 23 publications
0
24
0
3
Order By: Relevance
“…Cryptolocker, WannaCry, TeslaCrypt use DGA for generating domain name. Kramer and Bradfield [8] suggest a continuous monitoring approach for ransomware detection that includes -maintaining the ransomware signature and Indicators of Compromise (IOC), looking for file execution from %APPDATA% folder and %TEMP% folder, monitoring back-up files, checking file extensions, observing the anomalous network behaviour during key exchange and looking at I/O requests and Master File Table (MFT) in NTFS file Detection. Brewer [9] proposes an automated approach to track the changes to the system"s desktop that indicate ransomware-like behavior.…”
Section: Related Workmentioning
confidence: 99%
“…Cryptolocker, WannaCry, TeslaCrypt use DGA for generating domain name. Kramer and Bradfield [8] suggest a continuous monitoring approach for ransomware detection that includes -maintaining the ransomware signature and Indicators of Compromise (IOC), looking for file execution from %APPDATA% folder and %TEMP% folder, monitoring back-up files, checking file extensions, observing the anomalous network behaviour during key exchange and looking at I/O requests and Master File Table (MFT) in NTFS file Detection. Brewer [9] proposes an automated approach to track the changes to the system"s desktop that indicate ransomware-like behavior.…”
Section: Related Workmentioning
confidence: 99%
“…Malicious behaviors have been defined in different ways. The foundational approaches via computable functions [1], based in Kleene's recursion theorem [4,5,6], or the neat definition using MALog [20] capture the essence of such behaviors, but are too abstract to be used in practice or require the full specification of software functionality. Our work is close to the approaches using model checking and temporal logic formulas as malicious behavior specification [24,25].…”
Section: Related Workmentioning
confidence: 99%
“…Current antiviral detection methods and techniques are largely reactive, with antivirus software being updated according to new viruses and threats that are discovered (Filiol, 2005) (Dechaux and Filiol, 2016). There is an "arms race" between computer virus and antivirus writers (Kramer and Bradfield, 2010), and any antiviral techniques developed for current computer virus, are ultimately bypassed by new, and more advanced viral behaviours. A more proactive approach would be to detect new threats before they emerge in the real world, for which a thorough understanding of the possible behaviours, structures and capabilities of computer viruses is required.…”
Section: Introductionmentioning
confidence: 99%