tory virus (Cohen, 1985, page 84), (Cohen, 1987a).
Only a dynamic analysis (into a virtual environment)
can enable the analyst to guess (step by step) program
S ’s actions. But in this case (detection of virtual en-
vironment) program S performs only benign actions
due to the communication with the server under the
attacker’s control. Hence the result.
The same antiviral experiments were performed
on this armoured version. None of the tests are posi-
tives.
6 CONCLUSION
The use of k-ary codes in which a program is no
longer a solo binary object but a k-set of files work-
ing to yield a final payload constituted the base of this
work with the outsourcing of each part to IPFS. In
this context, a serial mode operation vector is used,
so the execution is done part by part and for each part
instruction by instruction (block by block for IPFS).
In fact each instruction is deciphered on the fly and
then re-encrypted (or emptied of memory depending
on the version). For some instructions, they are gener-
ated directly from other encrypted instructions before
being decrypted and executed according to the pre-
vious principle. Therefore, the analyst or the antivi-
ral solution has a compact interpretation on the entire
code only because the interaction is performed with a
partial subcategory of this k-set. All codes are pulled
to repository of P2P source code version control sys-
tem where each version can be maintained updated
and upgraded. Data operations will be recoded to the
P2P distributed file system and are tracked. In case of
codes’ improvement or change, an update can be sub-
mitted for fix and later pushed to the target machines.
In conclusion, the potential of the blockchain
technology and decentralized storage is increasing.
The combination of the blockchain and IPFS is con-
sidered to be the future of the distributed internet. Be-
sides, the Interplanetary File System have many po-
tential to host different types of Dapps and is able to
connect many blockchains and content directly. Ad-
ditionally, some of the blockchain security challenges
have been exposed revealing the urgent necessity to
be sheltered from many assumption reasons of mali-
cious applicability, and which, if remained undevel-
oped will be exploited. Blockchain has been subject
to unique speculation and as we have perceived, it
has been advantageous in many domains. However,
this backbone that is enabling and protecting several
transactions, may drives motives for potential misuses
(Moubarak et al., 2017b). Thus, the next step can be
to dig further and explore the feasibly of embedding
the new malware into Dapps applications.
REFERENCES
Adleman, L. (1988). An abstract theory of computer
viruses, in” advances in cryptology—crypto’88”, vol.
403. Lecture Notes in Computer Science.
Beaucamps, P. and Filiol, E. (2007). On the possibility of
practically obfuscating programs - towards a unified
perspective of code protection. Journal in Computer
Virology, 3.
Bilar, D. and Filiol, E. (2009). On self-reproducing com-
puter programs. Journal in computer virology, 5(1):9–
87.
Bonfante, G., Kaczmarek, M., and Marion, J.-Y. (2006). On
abstract computer virology from a recursion theoretic
perspective. Journal in computer virology, 1(3-4):45–
54.
Cohen, F. (1985). Computer Viruses. PhD thesis, University
of Southern California.
Cohen, F. (1987a). Computer viruses. Comput. Secur.,
6(1):22–35.
Cohen, F. (1987b). Computer viruses: theory and experi-
ments. Computers & security, 6(1):22–35.
de Dr
´
ezigu
´
e, D., Fizaine, J.-P., and Hansma, N. (2006). In-
depth analysis of the viral threats with openoffice. org
documents. Journal in Computer Virology, 2(3):187–
210.
Desnos, A. (2009). Implementation of k-ary viruses in
python. Hack. lu.
Desnos, A., Erra, R., and Filiol, E. (2010). Processor-
dependent malware... and codes. CoRR,
abs/1011.1638.
Filiol (2015). Malware of the future.
Filiol, E. (2005). Strong cryptography armoured computer
viruses forbidding code analysis: the bradley virus. In
EICAR 2005, pages 216–227.
Filiol, E. (2006a). Computer viruses: from theory to appli-
cations. Springer Science & Business Media.
Filiol, E. (2006b). Malware pattern scanning schemes se-
cure against black-box analysis. Journal in Computer
Virology, 2(1):35–50.
Filiol, E. (2007a). Formalisation and implementation as-
pects of K -ary (malicious) codes. Journal in Com-
puter Virology, 3(2):75–86.
Filiol, E. (2007b). Formalisation and implementation as-
pects of k-ary (malicious) codes. Journal in Computer
Virology, 3(2):75–86.
Filiol, E. (2007c). Metamorphism, formal grammars and
undecidable code mutation. International Journal of
Computer Science, 2(1):70–75.
Filiol,
´
E. (2007d). Techniques virales avanc
´
ees. Springer.
Filiol, E. (2012). Malicious cryptology and mathemat-
ics. In Cryptography and Security in Computing. In-
techOpen.
ForSE 2020 - 4th International Workshop on FORmal methods for Security Engineering
802