{"id":"https://openalex.org/W4408124435","doi":"https://doi.org/10.3390/cryptography9010016","title":"Construction of Countably Infinite Programs That Evade Malware/Non-Malware Classification for Any Given Formal System","display_name":"Construction of Countably Infinite Programs That Evade Malware/Non-Malware Classification for Any Given Formal System","publication_year":2025,"publication_date":"2025-03-04","ids":{"openalex":"https://openalex.org/W4408124435","doi":"https://doi.org/10.3390/cryptography9010016"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography9010016","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9010016","pdf_url":"https://www.mdpi.com/2410-387X/9/1/16/pdf?version=1741078123","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/9/1/16/pdf?version=1741078123","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102993627","display_name":"Vasiliki Liagkou","orcid":"https://orcid.org/0000-0002-1162-5490"},"institutions":[{"id":"https://openalex.org/I120729142","display_name":"Research Academic Computer Technology Institute","ror":"https://ror.org/021nszj63","country_code":"GR","type":"facility","lineage":["https://openalex.org/I120729142","https://openalex.org/I4210154149"]},{"id":"https://openalex.org/I194019607","display_name":"University of Ioannina","ror":"https://ror.org/01qg3j183","country_code":"GR","type":"education","lineage":["https://openalex.org/I194019607"]},{"id":"https://openalex.org/I174878644","display_name":"University of Patras","ror":"https://ror.org/017wvtq80","country_code":"GR","type":"education","lineage":["https://openalex.org/I174878644"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Vasiliki Liagkou","raw_affiliation_strings":["Computer Technology Institute and Press\u2014\u201cDiophantus\u201d, University of Patras Campus, 26504 Patra, Greece","Department of Informatics and Telecommunications, University of Ioannina, 47100 Arta, Greece"],"affiliations":[{"raw_affiliation_string":"Computer Technology Institute and Press\u2014\u201cDiophantus\u201d, University of Patras Campus, 26504 Patra, Greece","institution_ids":["https://openalex.org/I120729142","https://openalex.org/I174878644"]},{"raw_affiliation_string":"Department of Informatics and Telecommunications, University of Ioannina, 47100 Arta, Greece","institution_ids":["https://openalex.org/I194019607"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042797834","display_name":"Panagiotis E. Nastou","orcid":null},"institutions":[{"id":"https://openalex.org/I98805295","display_name":"University of the Aegean","ror":"https://ror.org/03zsp3p94","country_code":"GR","type":"education","lineage":["https://openalex.org/I98805295"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Panagiotis E. Nastou","raw_affiliation_strings":["Applied Mathematics and Mathematical Modeling Laboratory, Department of Mathematics, University of the Aegean, 83200 Samos, Greece"],"affiliations":[{"raw_affiliation_string":"Applied Mathematics and Mathematical Modeling Laboratory, Department of Mathematics, University of the Aegean, 83200 Samos, Greece","institution_ids":["https://openalex.org/I98805295"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011756177","display_name":"Paul G. Spirakis","orcid":"https://orcid.org/0000-0001-5396-3749"},"institutions":[{"id":"https://openalex.org/I174878644","display_name":"University of Patras","ror":"https://ror.org/017wvtq80","country_code":"GR","type":"education","lineage":["https://openalex.org/I174878644"]},{"id":"https://openalex.org/I146655781","display_name":"University of Liverpool","ror":"https://ror.org/04xs57h96","country_code":"GB","type":"education","lineage":["https://openalex.org/I146655781"]}],"countries":["GB","GR"],"is_corresponding":false,"raw_author_name":"Paul Spirakis","raw_affiliation_strings":["Department of Computer Engineering and Informatics, University of Patras, 26504 Patra, Greece","Department of Computer Science, University of Liverpool, Liverpool L3 5TR, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering and Informatics, University of Patras, 26504 Patra, Greece","institution_ids":["https://openalex.org/I174878644"]},{"raw_affiliation_string":"Department of Computer Science, University of Liverpool, Liverpool L3 5TR, UK","institution_ids":["https://openalex.org/I146655781"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025854118","display_name":"Yannis C. Stamatiou","orcid":"https://orcid.org/0000-0002-8925-9427"},"institutions":[{"id":"https://openalex.org/I174878644","display_name":"University of Patras","ror":"https://ror.org/017wvtq80","country_code":"GR","type":"education","lineage":["https://openalex.org/I174878644"]},{"id":"https://openalex.org/I120729142","display_name":"Research Academic Computer Technology Institute","ror":"https://ror.org/021nszj63","country_code":"GR","type":"facility","lineage":["https://openalex.org/I120729142","https://openalex.org/I4210154149"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Yannis C. Stamatiou","raw_affiliation_strings":["Computer Technology Institute and Press\u2014\u201cDiophantus\u201d, University of Patras Campus, 26504 Patra, Greece","Department of Business Administration, University of Patras, 26504 Patra, Greece"],"affiliations":[{"raw_affiliation_string":"Computer Technology Institute and Press\u2014\u201cDiophantus\u201d, University of Patras Campus, 26504 Patra, Greece","institution_ids":["https://openalex.org/I120729142","https://openalex.org/I174878644"]},{"raw_affiliation_string":"Department of Business Administration, University of Patras, 26504 Patra, Greece","institution_ids":["https://openalex.org/I174878644"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5025854118"],"corresponding_institution_ids":["https://openalex.org/I120729142","https://openalex.org/I174878644"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.04214354,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"1","first_page":"16","last_page":"16"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9259478449821472},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6393359303474426},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5720439553260803},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.43867647647857666},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.4323636591434479}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9259478449821472},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6393359303474426},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5720439553260803},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.43867647647857666},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.4323636591434479}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography9010016","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9010016","pdf_url":"https://www.mdpi.com/2410-387X/9/1/16/pdf?version=1741078123","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:1885c122b32a42dc909c6a7f49376e41","is_oa":true,"landing_page_url":"https://doaj.org/article/1885c122b32a42dc909c6a7f49376e41","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 9, Iss 1, p 16 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography9010016","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9010016","pdf_url":"https://www.mdpi.com/2410-387X/9/1/16/pdf?version=1741078123","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5356549776","display_name":null,"funder_award_id":"830929","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4408124435.pdf"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W1582350176","https://openalex.org/W1987939949","https://openalex.org/W1988819861","https://openalex.org/W1992485833","https://openalex.org/W1996975221","https://openalex.org/W2024170198","https://openalex.org/W2036869460","https://openalex.org/W2047181172","https://openalex.org/W2047764386","https://openalex.org/W2060145807","https://openalex.org/W2112459718","https://openalex.org/W2120142396","https://openalex.org/W2126160338","https://openalex.org/W2134405741","https://openalex.org/W2155535003","https://openalex.org/W2170267084","https://openalex.org/W2215444025","https://openalex.org/W2775486083","https://openalex.org/W2962117360","https://openalex.org/W2964157876","https://openalex.org/W2997191565","https://openalex.org/W3177549765","https://openalex.org/W3181593253","https://openalex.org/W3203278759","https://openalex.org/W4239357417","https://openalex.org/W4318833370","https://openalex.org/W6629841029","https://openalex.org/W6634829301","https://openalex.org/W6683368390"],"related_works":["https://openalex.org/W2469507153","https://openalex.org/W2008790809","https://openalex.org/W2160963033","https://openalex.org/W3022706011","https://openalex.org/W2909615516","https://openalex.org/W2768892939","https://openalex.org/W2249256574","https://openalex.org/W2397240470","https://openalex.org/W4210907385","https://openalex.org/W2065339563"],"abstract_inverted_index":{"The":[0],"formal":[1,36,49,170,179,197,225],"study":[2],"of":[3,12,21,27,31,38,51,55,90,93,103,142,152,210,222],"computer":[4,57,95],"malware":[5,104,156,203,215],"was":[6],"initiated":[7],"in":[8,15,24,40,72],"the":[9,16,25,28,33,52,109,150,196,219,223],"seminal":[10],"work":[11,122],"Fred":[13],"Cohen":[14,43],"mid-80s,":[17],"who":[18],"applied":[19],"elements":[20],"Computation":[22],"Theory":[23],"investigation":[26],"theoretical":[29,126],"limits":[30],"using":[32],"Turing":[34,61],"Machine":[35,62],"model":[37,100],"computation":[39],"detecting":[41,69],"viruses.":[42],"gave":[44],"a":[45,56,60,87,94,124],"simple":[46,88],"but":[47],"realistic":[48],"definition":[50,92],"characteristic":[53],"actions":[54],"virus":[58,96],"as":[59,98,176],"that":[63,68,108,166,199],"replicates":[64],"itself":[65],"and":[66,106,132,155],"proved":[67],"this":[70,79,162],"behaviour,":[71],"general,":[73],"is":[74],"an":[75,135,177],"undecidable":[76],"problem.":[77],"In":[78],"paper,":[80],"we":[81,164],"complement":[82],"Cohen\u2019s":[83,119],"approach":[84],"by":[85,195],"providing":[86],"generalization":[89],"his":[91],"so":[97],"to":[99,149],"any":[101,168],"type":[102],"behaviour":[105],"showing":[107],"malware/non-malware":[110],"classification":[111],"problem":[112],"is,":[113],"again,":[114],"undecidable.":[115],"Most":[116],"importantly,":[117],"beyond":[118],"work,":[120],"our":[121],"provides":[123],"generic":[125],"framework":[127],"for":[128,167,188],"studying":[129],"anti-malware":[130,178],"applications":[131],"identifying,":[133],"at":[134],"early":[136],"stage,":[137],"before":[138],"their":[139,143],"deployment,":[140],"several":[141],"inherent":[144],"vulnerabilities":[145],"which":[146,172,189,217],"may":[147],"lead":[148],"construction":[151],"zero-day":[153],"exploits":[154],"strains":[157],"with":[158],"stealth":[159],"properties.":[160],"To":[161],"end,":[163],"show":[165],"given":[169,224],"system,":[171],"can":[173,192],"be":[174,193],"seen":[175],"model,":[180],"there":[181],"are":[182,201],"infinitely":[183,208],"many,":[184],"effectively":[185],"constructible":[186],"programs":[187,212,216],"no":[190],"proof":[191],"produced":[194],"system":[198],"they":[200],"either":[202],"or":[204],"non-malware":[205],"programs.":[206],"Moreover,":[207],"many":[209],"these":[211],"are,":[213],"indeed,":[214],"evade":[218],"detection":[220],"powers":[221],"system.":[226]},"counts_by_year":[],"updated_date":"2026-02-27T16:54:17.756197","created_date":"2025-10-10T00:00:00"}
