Please use this identifier to cite or link to this item: http://hdl.handle.net/10125/64563

Toward a Mathematical Understanding of the Malware Problem

File Size Format  
0662.pdf 712.45 kB Adobe PDF View/Open

Item Summary

Title:Toward a Mathematical Understanding of the Malware Problem
Authors:Fiske, Michael
Keywords:The Science and Engineering of Cyber Systems
dynamical system
instability
malware
register machine
show 1 morestructurally stable
show less
Date Issued:07 Jan 2020
Abstract:Malware plays a significant role in breaching computer systems. Previous research has focused on malware detection even though detection is up against theoretical limits in computer science and current methods are inadequate in practice. We explain the susceptibility of computation to malware as a consequence of the instability of Turing and register machine computation. The behavior of a register machine program can be sabotaged, by making a very small change to the original, uninfected program. Stability has been studied extensively in dynamical systems and in engineering fields such as aerospace. Our primary contribution introduces mathematical tools from topology and dynamical systems to explain why register machine computation is susceptible to malware sabotage. A correspondence is constructed such that one computational step of a Turing machine maps to one iteration of a dynamical system in the x-y plane and vice versa. Using this correspondence, another contribution defines and demonstrates a structural instability in a Universal Turing machine encoding. One research direction proposes to better understand instability in conventional computation by studying non-isolated metrics on the space of Turing machines; another suggests searching for stable computation in unconventional machines.
Pages/Duration:10 pages
URI:http://hdl.handle.net/10125/64563
ISBN:978-0-9981331-3-3
Rights:Attribution-NonCommercial-NoDerivatives 4.0 International
https://creativecommons.org/licenses/by-nc-nd/4.0/
Appears in Collections: The Science and Engineering of Cyber Systems


Please email libraryada-l@lists.hawaii.edu if you need this content in ADA-compliant format.

This item is licensed under a Creative Commons License Creative Commons