2140 lines
104 KiB
Plaintext
2140 lines
104 KiB
Plaintext
|
|
/~~~~~~\ *********** ***********
|
|
~\( * * )/~ *********** ***********
|
|
( \___/ ) *** *** ***
|
|
\______/ *********** *** *** *** *******
|
|
@/ \@ *** *** *** *** *** ***
|
|
*** *** *** *** *** ***********
|
|
*** *** *** *** *** *********** |\__/|
|
|
******** *** ***** / \
|
|
******** *** *** ~\( 0 0 )/~
|
|
*** ( /---\ )
|
|
*** \______/
|
|
*** @/ \@
|
|
***
|
|
|
|
|
|
|
|
|
|
==============================================================
|
|
|
|
April - July, 1994. Volume I, Issue 1
|
|
|
|
==============================================================
|
|
|
|
CONTENTS:
|
|
|
|
|
|
1. "Alive" Is Alive Again! - Editor's Word
|
|
|
|
2. In the Trap of the Language
|
|
|
|
3. Puzzle - Continued (2)
|
|
|
|
4. The Legend - Fred Cohen
|
|
... Interview
|
|
... Article Review - Trends in Computer Virus Research
|
|
|
|
5. The Mystery - Mark Ludwig
|
|
... Interview
|
|
... It Conquered the World : A Fiction Excerpt from Mark
|
|
Ludwig's "CVAL&E" for Your Enjoyment
|
|
|
|
6. The Reality - Vesselin Bontchev
|
|
... Interview
|
|
... Dozen Reasons Why a "Good" Virus Is a Bad Idea
|
|
.............................Vesselin Bontchev
|
|
... An Example of Beneficial Virus
|
|
.............................Vesselin Bontchev
|
|
|
|
7. The Grand Debate about Beneficial Viruses and Artificial Life
|
|
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
% %
|
|
% ALIVE, Copyright 1994. By Suzana Stojakovic-Celustka %
|
|
% This magazine may be archived and reproduced without charge %
|
|
% throughout Cyberspace under the condition that it is left %
|
|
% in its entirety. Send submissions, comments, etc. to %
|
|
% celust@cslab.felk.cvut.cz and subscription requests to %
|
|
% mxserver@ubik.demon.co.uk %
|
|
% %
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
|
|
****<<<<****>>>>****<<<<****>>>>****<<<<****>>>>****<<<<****>>>>****<<<<****
|
|
|
|
"ALIVE" IS ALIVE AGAIN! - EDITOR'S WORD
|
|
=======================================
|
|
|
|
Dear Readers!
|
|
|
|
For those who already lost every hope that "Alive" will be alive ever again
|
|
here are the good news. The first real (non experimental) issue of "Alive"
|
|
is right in front of your eyes. Apologies and thanks to all of you who were
|
|
patient till now.
|
|
|
|
The reasons of delay are various. As it usually happens real life interferes
|
|
with the best intentions. Sincerely, it is not so easy to bring to the world
|
|
new number when one person is editor, technical editor, graphic designer,
|
|
journalist, critic, student, etc...Anyway there are signs that such a
|
|
situation will improve in some time, so no more complainings. I hope you will
|
|
like this number and am expecting any and all comments and contributions.
|
|
|
|
About this issue:
|
|
-----------------
|
|
|
|
The first article "In the Trap of the Language" is my attempt to find out how
|
|
to make a good definition of a computer virus. I have to confess that I
|
|
didn't expect that this problem would bring me so far in philosophy. Somehow,
|
|
I am still not sure that exact solution exists and probably this topic will
|
|
have a continuation.
|
|
|
|
The second article is one more step to find the solution of Puzzle presented
|
|
in the last number. With a little help of Fred Cohen, here is the first try
|
|
to define environment in which is suspected to have something "alive".
|
|
|
|
I was very glad to be a host to three guests in this number : Fred Cohen,
|
|
Mark Ludwig and Vesselin Bontchev. They are speaking about themselves and
|
|
their work exclusively for "Alive". If you thought that you knew everything
|
|
about any of these persons, maybe you were wrong. Read the interviews and
|
|
might be that you will find something new.
|
|
|
|
Respecting Fred Cohen's wish to not reproduce any of his published articles
|
|
or texts in electronic form, in this number you can read only review of his
|
|
article "Trends in Computer Virus Research". There is also an excerpt from
|
|
Mark Ludwig's new book "Computer Viruses, Artificial Life and Evolution",
|
|
reprinted from "Crypt Newsletter" No 22 with permission. Vesselin Bontchev
|
|
made an extension of his "Dosen Reasons Why a "Good" Virus Is a Bad Idea"
|
|
(which appeared originally on Virus-L some time ago) exclusively for "Alive".
|
|
The Reasons are pretty convincing, but there is also his Example of
|
|
Beneficial Virus presented in this number. It is actually an excerpt from a
|
|
longer Mr Bontchev's recent posting to Virus-L.
|
|
|
|
With these guests the Grand Debate about Beneficial Viruses and Artificial
|
|
Life starts from this number in "Alive". If you think that you have something
|
|
to say about this theme, please send your contributions. You don't have to
|
|
be an expert or a "good" guy/girl. As long as contributions have a form
|
|
according to "Alive" guidelines, they will be deeply appreciated.
|
|
|
|
|
|
About contributions and subscriptions:
|
|
--------------------------------------
|
|
|
|
Preferred form of contributions are short articles or previews. Comments on
|
|
contributions will be deeply appreciated, but will be published only if they
|
|
have a convenient form. This is -not- a place for polemics or blames, so
|
|
please don't send your comments if you have nothing constructive to say. The
|
|
preferred form of code examples is pseudo-code. The code of existing viruses
|
|
which somebody could consider beneficial will not be published here. Send
|
|
your contributions and comments to celust@cslab.felk.cvut.cz
|
|
|
|
**************************************************************************
|
|
WARNING!! During the vacation time, i.e. 20th July - 1th September, please
|
|
send your contributions and comments to celustka@sun.felk.cvut.cz
|
|
**************************************************************************
|
|
|
|
Subscriptions requests should be sent to mxserver@ubik.demon.co.uk
|
|
|
|
|
|
Where can you find "Alive":
|
|
---------------------------
|
|
|
|
The number of hosts where you can find "Alive" increased since last number.
|
|
The magazine is available for anonymous ftp from following sites:
|
|
|
|
1. ftp.informatik.uni-hamburg.de in /pub/virus/texts/alive
|
|
|
|
(by courtesy of Vesselin Bontchev, Virus Test Center, University of Hamburg,
|
|
Germany)
|
|
|
|
2. ftp.demon.co.uk in /pub/antivirus/journal/alive
|
|
|
|
(by courtesy of Anthony Naggs, UK)
|
|
|
|
3. ftp.elte.hu in /pub/virnews
|
|
|
|
(by courtesy of Toth J. Szabolcs, Eotvos Lorand University, Hungary)
|
|
|
|
4. ftp.u.washington.edu in public/Alive
|
|
|
|
(by courtesy of Jeffrey E. Hulten, University of Washington, USA)
|
|
|
|
|
|
Gophers:
|
|
|
|
saturn.felk.cvut.cz
|
|
|
|
(by courtesy of administrative personnel of Computer Department, Czech
|
|
Technical University, Prague, Czech Republic)
|
|
|
|
ursus.bke.hu
|
|
|
|
(by courtesy of Toth J. Szabolcs, Eotvos Lorand University, Hungary)
|
|
|
|
|
|
Other places:
|
|
|
|
Slovak Antivirus Center BBS +42 7 2048 232 ZyXEL 1496+ 19.200 Bd NonStop
|
|
|
|
(by courtesy of Peter Hubinsky, Slovak Antivirus Center, Bratislava,
|
|
Slovakia)
|
|
|
|
Software Library of University of St. Gallen - the requests may be sent to
|
|
luca.sambucci@ntgate.unisg.ch
|
|
|
|
(by courtesy of Luca Sambucci, University of St. Gallen, Switzerland)
|
|
|
|
Any offer from other sites will be appreciated.
|
|
|
|
|
|
Acknowledgements:
|
|
-----------------
|
|
|
|
I wish to thank to Fred Cohen, Mark Ludwig and Vesselin Bontchev for their
|
|
appearance and contributions in this number.
|
|
|
|
Also thanks to Jeffrey E. Hulten (USA), Philip Fites (Canada) and Vladimir
|
|
Vrabec (Czech Republic) for their suggestions how to improve the quality of
|
|
"Alive". Hopefully, there will be PostScript and Hypertext (WWW) versions of
|
|
"Alive" in near future.
|
|
|
|
There are no language corrections in this number, but I would like to thank
|
|
to Martin Tharp (USA) for corrections he made in the last number.
|
|
|
|
|
|
About editor:
|
|
-------------
|
|
|
|
The editor is currently a Ph.D student on Computer Department, Faculty of
|
|
Electrical Engineering, Czech Technical University in Prague. Is working on
|
|
her Ph.D thesis and hoping that "Alive" will bring a lot of useful material
|
|
and a lot of fun.
|
|
|
|
|
|
So, dear readers, enjoy the reading and make your copy of "Alive" really
|
|
alive: SPREAD IT WIDELY!
|
|
|
|
|
|
****<<<<****>>>>****<<<<****>>>>****<<<<****>>>>****<<<<****>>>>****<<<<****
|
|
|
|
Some say that life's an illusion
|
|
Who knows what's false or what's true...
|
|
...With all of its glories and all of its faults
|
|
It seems life is a bittersweet waltz...
|
|
|
|
- "Bittersweet Waltz" -
|
|
|
|
****<<<<****>>>>****<<<<****>>>>****<<<<****>>>>****<<<<****>>>>****<<<<****
|
|
|
|
|
|
IN THE TRAP OF THE LANGUAGE
|
|
===========================
|
|
|
|
There is a problem which bothered me since the results of Contest for the
|
|
Best Virus Definition were published. It seemed that plain language was not
|
|
suitable to define computer virus properly. Well, the problem of good
|
|
definition of whatever is not anything new.
|
|
|
|
1. GOOD REPRESENTATIONS
|
|
|
|
Looking for the recipe how to make good definitions I found some books. The
|
|
first one is "Artificial Intelligence" by Patrick Henry Winston [5]. There
|
|
are few words there about good representations:
|
|
|
|
"...In general, a representation is a set of conventions about how to
|
|
describe a class of things. A description makes a use of the conventions of
|
|
a representation to describe some particular thing.
|
|
|
|
Finding the appropriate representation is a major part of problem solving.
|
|
Consider, for example, the following children's puzzle:
|
|
|
|
The Farmer, Fox, Goose and Grain:
|
|
|
|
A farmer wants to move himself, a silver fox, a fat goose, and some tasty
|
|
grain across a river. Unfortunately, his boat is so tiny he can take only
|
|
one of his possessions across on any trip. Worse yet, an unattended fox
|
|
will eat a goose, and an unattended goose will eat grain, so the farmer
|
|
must not leave the fox alone with the goose or the goose alone with the
|
|
grain. What is he to do?
|
|
|
|
Described in English, the problem takes a few minutes to solve because you
|
|
have to separate important constraints from irrelevant details. English is
|
|
not a good representation.
|
|
|
|
Described more appropriately, however, the problem takes no time at all, for
|
|
everyone can draw a line from the start to finish in figure 1. instantly. Yet
|
|
drawing that line solves the problem because each boxed picture denotes a
|
|
safe arrangement of the farmer and his possessions on the banks of the river,
|
|
and each connection between pictures denotes a legal crossing. The drawing
|
|
is a good description because the allowed situations and legal crossings are
|
|
clearly defined and there are no irrelevant details.
|
|
|
|
-------- --------
|
|
| Grain | | Farmer |
|
|
| ====== |-->| Goose |
|
|
| Farmer | | Grain |
|
|
| Fox |<--| ====== |
|
|
| Goose | | Fox |
|
|
|________| |________|
|
|
^ | ^ |
|
|
| V | V
|
|
-------- -------- -------- -------- -------- --------
|
|
| Farmer | | Fox | | Farmer | | Goose | | Farmer | | ====== |
|
|
| Fox |-->| Grain |-->| Fox | | ====== |-->| Goose |-->| Farmer |
|
|
| Goose | | ====== | | Grain | | Farmer | | ====== | | Fox |
|
|
| Grain |<--| Farmer |<--| ====== | | Fox |<--| Fox |<--| Goose |
|
|
| ====== | | Goose | | Goose | | Grain | | Grain | | Grain |
|
|
|________| |________| |________| |________| |________| |________|
|
|
^ | ^ |
|
|
| V | V
|
|
-------- --------
|
|
| Fox | | Farmer |
|
|
| ====== |-->| Fox |
|
|
| Farmer | | Goose |
|
|
| Goose |<--| ====== |
|
|
| Grain | | Grain |
|
|
|________| |________|
|
|
|
|
Figure 1. ( ====== denotes a river)
|
|
|
|
The representation principle:
|
|
|
|
Once a problem is described using an appropriate representation, the problem
|
|
is almost solved..."
|
|
|
|
Reading this, one could say: "Oh, I knew that. What is so special? If I can
|
|
describe problem properly then solution is not so far. But, I should know
|
|
something about the problem first.."
|
|
|
|
2. THE KNOWLEDGE AND THE LANGUAGE
|
|
|
|
Yes, here we come. What is the knowledge at all? Another interesting book
|
|
"The Tao of Physics" by Fritjof Capra [2] says:
|
|
|
|
"...Rational knowledge is derived from the experience we have in objects and
|
|
events in our everyday environment. It belongs to the realm of the intellect
|
|
whose function is to discriminate, divide, compare, measure and categorize.
|
|
In this way, a world of intellectual distinctions is created; of opposites
|
|
which can only exist in relation to each other.
|
|
|
|
Abstraction is a crucial feature of this knowledge, because in order to
|
|
compare and to classify the immense variety of shapes, structures and
|
|
phenomena around us we cannot take all their features into account, but have
|
|
to select a few significant ones. Thus we construct an intellectual map of
|
|
reality in which things are reduced to their general outlines. Rational
|
|
knowledge is thus a system of abstract concepts and symbols, characterized
|
|
by linear, sequential structure which is typical of our thinking and
|
|
speaking. In most languages this linear structure is made explicit by the use
|
|
of alphabets which serve to communicate experience and thought in long line
|
|
of letters..."
|
|
|
|
Here comes the question again: how much is the plain language suitable to
|
|
describe natural world if it is an abstraction itself? Reading the same book
|
|
further:
|
|
|
|
"...The natural world on the other hand, is one of infinite varieties and
|
|
complexities, a multidimensional world which contains no straight lines or
|
|
completely regular shapes, where things do not happen in sequences, but all
|
|
together...It is clear that our abstract system of conceptual thinking can
|
|
never describe or understand this reality completely. In thinking about the
|
|
world we are faced with the same kind of problem as the cartographer who
|
|
tries to cover the curved face of the Earth with a sequence of plane maps.
|
|
We can only expect an approximate representation of reality from such a
|
|
procedure, and all rational knowledge is therefore necessarily limited...
|
|
To quote the semanticist Alfred Korzybski: 'The map is not the territory'...
|
|
|
|
...For most of us it is very difficult to be constantly aware of the
|
|
limitations and of the relativity of conceptual knowledge. Because our
|
|
representation of reality is so much easier to grasp than reality itself, we
|
|
tend to confuse the two and to take our concepts and symbols for reality..."
|
|
|
|
Oh well, it is clearer now (or maybe not), but what to do? Especially in
|
|
science where we need unambiguous descriptions. Ibidem:
|
|
|
|
"...The inaccuracy and ambiguity of our language is essential for poets who
|
|
work largely with its subconscious layers and associations. Science, on the
|
|
other hand, aims for clear definitions and unambiguous connections, and
|
|
therefore it abstracts language further by limiting the meaning of its words
|
|
and by standardizing its structure, in accordance with the rules of logic.
|
|
The ultimate abstraction takes place in mathematics where words are replaced
|
|
by symbols and where the operations of connecting the symbols are rigorously
|
|
defined. In this way, scientists can condense information into one equation,
|
|
i.e. into one single line of symbols, for which they would need several pages
|
|
of ordinary writing..."
|
|
|
|
So, it seems that mathematics is a proper language for the science. Is it
|
|
really? Continuing:
|
|
|
|
"...The view that mathematics is nothing but an extremely abstracted and
|
|
compressed language does not go unchallenged. Many mathematicians, in fact,
|
|
believe that mathematics is not just a language to describe nature, but is
|
|
inherent in nature itself. The originator of this belief was Pythagoras who
|
|
made the famous statement 'All things are numbers' and developed a very
|
|
special kind of mathematical mysticism. Phytagorean philosophy thus
|
|
introduced logical reasoning into the domain of religion...
|
|
|
|
...The scientific method of abstraction is very efficient and powerful, but
|
|
we have to pay a price for it. As we define our system of concepts more
|
|
precisely, as we streamline it and make the connections more and more
|
|
rigorous, it becomes increasingly detached from the real world. Using again
|
|
Korzybski's analogy of the map, we could say that ordinary language is a map
|
|
which due to its intrinsic inaccuracy, has a certain flexibility so that it
|
|
can follow the curved shape of the territory to some degree. As we make it
|
|
more rigorous, this flexibility gradually disappears, and with the language
|
|
of mathematics we have reached a point where the links with reality are so
|
|
tenuous that the relation of the symbols to our sensory experience is no
|
|
longer evident. This is why we have to supplement our mathematical models and
|
|
theories with verbal interpretations, again using concepts which can be
|
|
understood intuitively, but which are slightly ambiguous and inaccurate..."
|
|
|
|
It looks like a magic circle: real world - language - mathematics - language
|
|
- real world. Where is the reality?
|
|
|
|
"...It is important to realize the difference between the mathematical models
|
|
and their verbal counterparts. The former are rigorous and consistent as far
|
|
as their internal structure is concerned, but their symbols are not related
|
|
to our experience. The verbal models, on the other hand, use concepts which
|
|
can be understood intuitively, but which are slightly ambiguous and
|
|
inaccurate..."
|
|
|
|
3. WHERE WE ARE?
|
|
|
|
Taking this trip through the theory we are coming back to the initial
|
|
question: is natural language appropriate tool to define a computer virus?
|
|
There is no doubt that computer viruses belong to the real world. One can try
|
|
to define a computer virus using natural language only. As results of Contest
|
|
for the Best Virus Definition and many bitter discussions on Virus-L show,
|
|
such definitions are still very inaccurate. Even worse, everybody can define
|
|
a computer virus on his or her own way which leads to confusion. Few
|
|
mathematical definitions while more accurate are not widely understandable...
|
|
|
|
The one of most known mathematical definitions of computer virus was given
|
|
by Fred Cohen. Here are few words from him about this subject:
|
|
|
|
-----------------------------------------------------------------------------
|
|
A: Can the use of mathematics avoid ambiguity of plain language in definition
|
|
of computer virus?
|
|
|
|
FC:
|
|
|
|
I translate - Can the use of a precise and well defined language avoid
|
|
ambiguity of plain language?...Mathematics is a subclass of the more general
|
|
class of languages. All mathematics is linguisticly defined, therefore
|
|
language, if used precisely, can be as accurate as mathematics. The real
|
|
problem is that mathematics says a lot of things more concisely than language
|
|
because it is essentially a set of macros. For linguistic definitions to work
|
|
for regular people, they have to be short enough to remember and accurate
|
|
enough to apply. Hence my very short linguistic definition:
|
|
|
|
- A life form (substitute virus if desired) is an information structure that
|
|
reproduces in a particular environment. -
|
|
-----------------------------------------------------------------------------
|
|
|
|
4. THE END IS NEW BEGINNING
|
|
|
|
Well, I could summarize now what I have learnt about how to make a good
|
|
definition:
|
|
|
|
1. The first step is to check what is our knowledge about the problem. It is
|
|
also a first level of abstraction, i.e. we cannot take all features of
|
|
observed phenomenon into account, but have to select a few significant ones.
|
|
|
|
This process is common in everyday life. One evokes a "mental model" about
|
|
some concept. What will such a "mental model" show depends on information one
|
|
has collected about the subject till that moment. Such an information is
|
|
usually different for every individual depending on his or her experience,
|
|
education, source of information, interest, etc. In the case of computer
|
|
viruses the knowledge will include the information about computers,
|
|
programming, possibly biological viruses, etc.
|
|
|
|
The problem with "mental models" is that probably no two persons with the
|
|
same "model" exist. Also exchange of "mental models" is not usual way of
|
|
communication today.
|
|
|
|
2. The second step is to find a representation for a "mental model", so one
|
|
could share it with other people. It is the further level of abstraction,
|
|
i.e. choice of a set of conventions about how to describe a class of things.
|
|
|
|
The most common tool one will use for description is natural language. It
|
|
means one will describe a "mental model" using words which are sequences of
|
|
letters from some alphabet. In fact, one is constructing a "natural language
|
|
model" of phenomenon. To represent computer virus by English language the
|
|
words used could be: "reproduction", "infection", "program", etc.
|
|
|
|
The problem with natural language is that there does not exist universal
|
|
language which all people would understand (that problem is impressively
|
|
demonstrated in the story of the Tower of Babylon [3]). Furthermore, even in
|
|
the limits of one language, it can often happen that the same words will have
|
|
different meanings for different people ("There are many different languages
|
|
in the world, yet none of them is without meaning." - 1 Corinthians 14.10).
|
|
It is what we call ambiguity and inaccuracy of natural language.
|
|
|
|
3. The science and technique need unambiguous descriptions. For that reason
|
|
it is necessary to abstract the language further. Such an extremely
|
|
abstracted and compressed language is mathematics. This language is more
|
|
accurate and precise than natural language. It is also universal for the
|
|
people who understand it.
|
|
|
|
The problem with mathematics is that it is not a language which is commonly
|
|
used for communication in everyday life. Mathematical models will be
|
|
understood by particular groups of people only.
|
|
|
|
4. To ease understanding of mathematical models to wider audience, they
|
|
should be accompanied with verbal interpretations which will explain symbols
|
|
used. The graphic representation of mathematical models is also useful. As
|
|
it was shown in the example at the beginning of this text, drawings are
|
|
pretty convenient descriptions in some cases.
|
|
|
|
The problem here arises when one separates verbal or graphic interpretation
|
|
from mathematical definition. It may cause the similar confusion as stated
|
|
in point two.
|
|
|
|
The above steps show different levels of abstraction (or modelling) one
|
|
should pass to obtain an accurate definition. Each level has its own inherent
|
|
problems. The accuracy required depends, in the last instance, on the
|
|
environment where definition will be applied. In the case of computer viruses
|
|
the most of the people will be satisfied with definition in natural language.
|
|
It has to be stressed again that such a definition will be inaccurate due to
|
|
ambiguity of natural language. The good technical definition of computer
|
|
virus should be the mathematical one because of its accuracy and consistence.
|
|
It should be also accompanied with verbal and graphical interpretations for
|
|
better understanding.
|
|
|
|
Although above text does not give a good definition of computer virus
|
|
immediately, it answers to some questions. Namely, it explains why the
|
|
results of the Contest in technical categories were so poor. Simply, because
|
|
mathematical and verbal parts were separated from each other in the
|
|
guidelines of the Contest for the Best Virus Definition. It also explains the
|
|
very good results in poetical category. The ambiguity of natural language was
|
|
not an obstacle there, just the opposite, it was an advantage. Greater
|
|
freedom in wording gave interesting results.
|
|
|
|
Talking again about technical definitions, there are new questions which
|
|
bother me now. The natural language and mathematics follow different logic
|
|
in their structure. The formal mathematical logic is monotone, i.e. if
|
|
formula is provable in some theory T it is also provable in every theory T',
|
|
where T is subset of T'. It means that the more initial axioms exist, the
|
|
more new statements is possible to prove. It does not always work in real
|
|
life. There are many universal statements in real life which have numerous
|
|
implicit suppositions which are not possible to include initially. For
|
|
example, from supposition that every bird flies, we can conclude that certain
|
|
bird named Quido can also fly. Later we find out that Quido is a penguin and
|
|
penguins do not fly. In that moment our system of reasoning should fall
|
|
apart, because this fact is obviously controversial. Nevertheless, such a
|
|
type of inconsistency is not an obstacle in everyday life. The natural
|
|
language covers this inconsistency better. It can be said that natural
|
|
language follows non-monotone logic. So, having a mathematical definition
|
|
which is accompanied by verbal counterpart it is still questionable how they
|
|
will match each other.
|
|
|
|
There is also the question how the final model or "picture" corresponds to
|
|
reality, i.e. how to prove that it is true. That problem is not new. Ludwig
|
|
Wittgenstein says in his Tractatus Logico-Philosophicus [6] :
|
|
|
|
" 2.223
|
|
To recognize if picture is true or false, we should compare it with reality.
|
|
|
|
(Um zu erkennen, ob das Bild wahr oder falsch ist, muessen wir es mit der
|
|
Wirklichkeit vergleichen.)
|
|
|
|
2.224
|
|
From picture itself it is not possible to recognize if it is true or false.
|
|
|
|
(Aus dem Bild allein ist nicht zu erkennen, ob es wahr oder falsch ist.)
|
|
|
|
2.225
|
|
An a priori true picture does not exist.
|
|
|
|
(Ein a priori wahres Bild gibt es nicht.)
|
|
|
|
3
|
|
Logical picture of fact is thought.
|
|
|
|
(Das logische Bild der Tatsache ist der Gedanke.) "
|
|
|
|
|
|
It is not so easy to answer the question of the truth. If we recall of
|
|
Korzybski's analogy of the map, the main question remains: How to find the
|
|
map which will cover the territory on the best way?
|
|
|
|
|
|
|
|
5. REFERENCES
|
|
|
|
1. Anzenbacher A., Introduction to Philosophy, SPNP, 1990. (in Czech)
|
|
|
|
2. Capra F., The Tao of Physics, Shambhala Publications Inc., 1975.
|
|
|
|
3. Good News Bible, The Bible Societies, 1990.
|
|
|
|
4. Marik V., Stepankova O., Lazansky J., et all, Artificial Intelligence I,
|
|
Academia Praha, 1993.
|
|
(in Czech)
|
|
|
|
5. Winston P.H., Artificial intelligence, Third edition, Addison - Wesley
|
|
Publishing Company, 1992.
|
|
|
|
6. Wittgenstein L., Tractatus Logico-Philosophicus, Oikoymenh, Prague, 1993.
|
|
(in Czech with original German text)
|
|
|
|
7. E-mail conversation with Fred Cohen
|
|
|
|
|
|
|
|
***&---&***&---&***&---&***&---&***&---&***&---&***&---&***&---&***&---&***&
|
|
|
|
The truth is like a tiger, but with many horns;
|
|
like a cow, but without a tail.
|
|
|
|
- Zenrinkushu saying -
|
|
|
|
***&---&***&---&***&---&***&---&***&---&***&---&***&---&***&---&***&---&***&
|
|
|
|
|
|
|
|
PUZZLE - CONTINUED (2)
|
|
======================
|
|
|
|
In the last issue of "Alive" I was wondering if Misra's algorithm for
|
|
regenerating token in logical ring could be considered as a sign of "life".
|
|
|
|
I got later some instructions from Fred Cohen how to solve this puzzle. One
|
|
should try to find a solution in two steps:
|
|
|
|
1. Define environment
|
|
2. Check if observed object reproduces in given environment.
|
|
|
|
Well, I will try to give now more information about environment and entities
|
|
considered.
|
|
|
|
Distributed systems:
|
|
--------------------
|
|
|
|
The environment in general is a distributed system. Distributed systems are
|
|
characterized by there being no global state visible to an observer at any
|
|
given instant. There is no common memory. There has to be a communication
|
|
system which enables sharing of information.
|
|
|
|
Computer networks have provided the first example of a distributed software
|
|
and hardware structure. The entities comprising the system are the sites at
|
|
which the computers are located and the communication system that enables
|
|
these sites to exchange messages.
|
|
|
|
Once the idea of a distributed system is introduced it becomes necessary to
|
|
specify its components, that is, the distributed algorithms. Whatever the
|
|
architecture of physical distributed system is, there is a need for
|
|
distributed algorithms which usually provide the basic functions that are
|
|
essential to all information systems, e.g. mutual exclusion, detecting
|
|
termination, etc.
|
|
|
|
|
|
Distributed algorithms:
|
|
-----------------------
|
|
|
|
1. Basics:
|
|
|
|
A distributed algorithm has been defined as a set of processes which, by
|
|
exchanging messages, co-operate to achieve a common end - performing some
|
|
desired function or providing some required service.
|
|
|
|
A distributed algorithm has two basic elements:
|
|
|
|
a) The processes that receive, manipulate, transform and output data.
|
|
|
|
b) The links along which these data flow and which form a network having both
|
|
structural and dynamic properties.
|
|
|
|
|
|
2. Concepts and techniques:
|
|
|
|
Whatever the design and construction methodology is employed, distributed
|
|
algorithms make use of the standard techniques associated with networks, such
|
|
as using the acknowledgement of receipt of a message to check that it has
|
|
been sent, broadcasting values to a group of processes and so on.
|
|
|
|
a) Diffusing computations
|
|
|
|
The processes can be linked by their communication paths in any manner
|
|
whatsoever, but one process is special in that initially it can only issue
|
|
messages. Further, and initially again, only this process can issue messages,
|
|
and subsequently any other process can issue a message only if it has
|
|
received one. It is the principle of spanning tree of the graph representing
|
|
the processes and their links.
|
|
|
|
b) Circulating token
|
|
|
|
The "token" here is a privilege or priority that is made to circulate around
|
|
the set of processes connected in a ring structure. This technique is used
|
|
particularly by algorithms for termination and mutual exclusion.
|
|
|
|
c) Time stamping
|
|
|
|
This mechanism makes it possible to label the events in a consistent manner
|
|
in relation to the interactions between the processes, that is, the issue and
|
|
receipt of messages: in terms of time as defined by the logical clocks, an
|
|
issue will always precede the corresponding receipt. This is particularly
|
|
used for algorithms that enter into distributed systems, such as those for
|
|
mutual exclusion and detection of mutual blocking.
|
|
|
|
|
|
3. Communication + ordering = control
|
|
|
|
By its very definition, a distributed algorithm is based on communication of
|
|
messages. In very many cases this communication can take place according to
|
|
particular topology - logical ring, tree structure - and with the use of
|
|
particular technique - circulating token, diffusing computation. Thus there
|
|
is relation of appropriateness between the structures of the topology and of
|
|
the communication control.
|
|
|
|
|
|
Summary:
|
|
--------
|
|
|
|
Environment considered in this puzzle is a distributed system. In such a
|
|
system distributed algorithms are used to provide the basic functions.
|
|
Distributed algorithms consist of separate processes that communicate with
|
|
one another by exchange of messages. The Misra's algorithm, presented in the
|
|
last number, showed the method for detecting the loss of a token (a special
|
|
message which the processes hand from one to the other in the logical ring)
|
|
and regeneration of token if it is lost. The question was if it was a sign
|
|
of life in given environment. The environment is more explained now. The next
|
|
step should be to show if basic entities, i.e. processes and tokens
|
|
(messages) can reproduce in such an environment.
|
|
|
|
|
|
References:
|
|
-----------
|
|
|
|
1. Janacek J., Distributed systems, 1993., Vydavatelstvi CVUT, (in Czech)
|
|
|
|
2. Raynal M., Distributed Algorithms and Protocols, 1988., John Wiley & Sons
|
|
|
|
3. E-mail conversation with Fred Cohen
|
|
|
|
|
|
^&*!^&*!^&*!^&*!^&*!^&*!^&*!^&*!^&*!^&*!^&*!^&*!^&*!^&*!^&*!^&*!^&*!^&*!^&*!
|
|
|
|
It moves. It moves not.
|
|
It is far, and It is near.
|
|
It is within all this,
|
|
And It is outside of all this.
|
|
|
|
- Upanishads -
|
|
|
|
^&*!^&*!^&*!^&*!^&*!^&*!^&*!^&*!^&*!^&*!^&*!^&*!^&*!^&*!^&*!^&*!^&*!^&*!^&*!
|
|
|
|
|
|
THE LEGEND - FRED COHEN
|
|
=======================
|
|
|
|
There are very few people dealing with computer viruses who have never heard
|
|
the name Fred Cohen. He is the person who first brought computer viruses to
|
|
scientific community. Here are some well known formal information:
|
|
|
|
In 1983, Fred Cohen performed and described the first experiments with
|
|
computer viruses. He gave the definition of computer virus in his paper
|
|
"Computer Viruses - Theory and Experiments", originally appearing in IFIPsec
|
|
84. To quote this paper:
|
|
|
|
"We define a computer "virus" as a program that can "infect" other programs
|
|
by modifying them to include a possibly evolved copy of itself."
|
|
|
|
Dr Cohen is best known for his pioneering work on computer viruses, the
|
|
invention of high integrity operating system mechanisms now in widespread
|
|
use, and automation of protection management functions. He regularly provides
|
|
consulting services for top management worldwide. During the past 10 years
|
|
of his research work, Fred Cohen wrote over 60 professional publications and
|
|
11 books. He is also a widely sought speaker, averaging over 12 invited talks
|
|
per year. Dr Cohen's current interests are in the areas of high integrity
|
|
distributed computing, office automation, information warfare, information
|
|
theory, artificial life and social aspects of computing.....
|
|
|
|
The Fred Cohen's formal biography is much, much longer, so let's leave it for
|
|
some other time. Some less formal information Fred Cohen gave himself,
|
|
speaking exclusively for "Alive" :
|
|
|
|
|
|
A: Why did you get interested in computer viruses?
|
|
|
|
FC:
|
|
|
|
When the idea came to me, it was incredibly interesting and I followed up.
|
|
The most interesting thing is the implication about life in general.
|
|
|
|
When I first started to do experiments and report on the results, I was
|
|
greeted with quite a bit of hateful commentary. At one point, I was even
|
|
called on the carpet of one of the Professors and accused of breaking into
|
|
computers at another university. I was innocent, but treated as if guilty.
|
|
That experience has helped me through the various other times I have been
|
|
falsely accused of breaking into computers.
|
|
|
|
Somewhere during that period, an old saying one printed on a wall at
|
|
Carnegie Tech by Alan Perlis came back to me:
|
|
|
|
Problems worthy of attack,
|
|
Prove their worth by fighting back.
|
|
|
|
|
|
A: What could you say about your work which is not so commonly known?
|
|
|
|
FC:
|
|
|
|
By now, I have published almost everything that has come up. The only real
|
|
disappointments relate to my inability to find any paying work related to
|
|
computer viruses. Lots of people have offered me work if I will say things
|
|
that aren't true, or endorse a product that I think is not very good. People
|
|
want the use of my name, but not the results of my effort and analysis. A
|
|
good example is the controversy surrounding benevolent viruses. I have been
|
|
black balled by many members of computer security community because I refuse
|
|
to renounce what I feel to be the truth. Among the leaders of the black
|
|
balling are academics who I think should be fighting for academic freedom and
|
|
the proliferation of new ideas, but it turns out they can get more research
|
|
grants by speaking out against new ideas than by giving them a fair airing.
|
|
It should be no big surprise - after all, as recently as 1988, I had an NSF
|
|
grant proposal rejected by poor reviews from academics who claimed that there
|
|
was no such thing as a computer virus and that viruses could not work in
|
|
systems with memory protection. Obviously, they never bothered to read any
|
|
of the 50 or so papers I have written on the subject.
|
|
|
|
|
|
A: What problems did you have in presentation of your work?
|
|
|
|
FC:
|
|
|
|
Only a few years ago, I was called a heathen by the computing community
|
|
including many professors at universities. The reason was that I supported
|
|
the notion of benevolent viruses. They had a public effort to black ball me
|
|
from research grants and other work, and it was almost unopposed. It got
|
|
quite lonely at times, but I persevered, and now I am only loathed and hated
|
|
by a small majority of the computing community.
|
|
|
|
In the fall of 1992, I was vocally and electronically vilified for publishing
|
|
the results on the effectiveness of built-in protection in Unix and Novell
|
|
networks against viruses and specifying the proper protection settings for
|
|
these environments. A few months later, Novell agreed with me, and they are
|
|
now changing some things about their protection scheme. Then, I was scheduled
|
|
to present an updated version of the paper at the DPMA conference in New
|
|
York, but they censored my benevolent virus paper, and had another speaker
|
|
present a paper about Novell Netware protection that was just plain wrong,
|
|
led Novel administrators to use inadequate protection, and got reprinted in
|
|
a national magazine.
|
|
|
|
I guess I was wrong - you never get used to it - but you have to decide if
|
|
you want to tell the truth as you see it or be popular - it is unlikely that
|
|
you will ever get both until well after you are dead. I have made a personal
|
|
choice that has doomed me to financial ruin over the last seven years or so,
|
|
but despite the financial impact on me and my family, I have tried to keep
|
|
on.
|
|
|
|
I have told you some of the problems I have encountered, and there are many
|
|
more of them, but let's keep to the positive aspects for now.
|
|
|
|
|
|
A: Why people still do not understand what do you mean when talking about
|
|
computer viruses?
|
|
|
|
FC:
|
|
|
|
There are at least two or three answers to that. The first one is that few
|
|
people recognize that viruses are really only part of a pair - the life form
|
|
and its environment. The life form is not alive except in an environment,
|
|
and yet for linguistic ease, we speak of viruses as if they were independent.
|
|
|
|
The second one is that simple explanations are commonly used to avoid having
|
|
to talk about the great breadth of issues involved in this field. It's a lot
|
|
easier to sell fear when you can claim all Indians are evil than when you
|
|
have to explain the difference between a Shawnee and a Mohawk. Another reason
|
|
is that most people aren't very interested in mathematics or being very
|
|
precise in what they do. Why bother to fully understand when you don't have
|
|
to. That's my view, but who knows what is really in other peoples' minds.
|
|
|
|
|
|
A: What is your concept of beneficial virus?
|
|
|
|
FC:
|
|
|
|
All technology (in my experience) is a two edged sword. We tend to see one
|
|
edge or the other, but both exist. When we explore both sides, we get a
|
|
deeper understanding. A benevolent virus is simply a virus that is used for
|
|
good purposes, but then this is a matter of context. For example, even an
|
|
extremely malicious virus used against an enemy could be perceived as
|
|
beneficial. Good and bad are relative. Most of the viruses I discuss as
|
|
benevolent are in fact reproducing symbol sequences without any known
|
|
malicious side effects. For example, the maintenance viruses that automate
|
|
systems administration functions are only doing what people would otherwise
|
|
have to do manually. They save extra labour by automatically distributing
|
|
themselves, etc. but otherwise, that are just the same as any other program.
|
|
|
|
|
|
A: Why did you get interested in artificial life?
|
|
|
|
FC:
|
|
|
|
I am interested in life because I am alive and want human life to continue,
|
|
to grow and evolve, and to advance and survive - both for myself and for my
|
|
children. The word artificial is really only a side effect of peoples' egos
|
|
requiring a special name for things they create. My interest is in deeper
|
|
understanding, and thus I examine the issues of life from an informational
|
|
standpoint and abstract out the specifics of whether the environment is
|
|
biological, electromagnetic, or what have you. I am an information scientist
|
|
by degree, training, and interest. As such, the study of information (a.k.a.
|
|
symbolic representations in whatever form) is one of my passions.
|
|
|
|
|
|
A: Why did you write "It's alive!"?
|
|
|
|
FC:
|
|
|
|
I enjoy writing, and I had done a significant amount of work on this subject
|
|
that I thought might be of interest to others. I was also somewhat
|
|
disappointed by the presentation of artificial life as it is given by the
|
|
growing mainstream of the field, and wanted a venue in which I could express
|
|
contrary and novel ideas without the growing set of conservative researchers
|
|
trying to stop me. When I talk about this topic, I am talking about real
|
|
living creatures, not things that mimic real living creatures. I am talking
|
|
about foundations for the understanding of life in the general sense, an
|
|
expansion of biology into the general informational domain, drawing parallels
|
|
between our biosphere and the infosphere, understanding the implications of
|
|
the changes in our environment through information systems before we
|
|
experiment on our children, understanding life forms in a different way,
|
|
understanding the implications of our emerging technologies and ways of
|
|
thinking about things, and other stuff like that.
|
|
|
|
In my book, I don't just talk about computers, but about the concepts of God,
|
|
evolution, the generation and creation of life, death and why it must exist
|
|
and why we need it to survive, the joint life forms we are now creating,
|
|
diseases of the joint life forms, models of biological life and our
|
|
willingness to commit memocide. I try to bring the richness of the world
|
|
together in my writing so that the outbreak of Ebola Zaire can be related to
|
|
the Jerusalem virus in a sensible way, and we can see the implications of our
|
|
actions.
|
|
|
|
As you can see, I have a passion for this subject, and if I continue at this
|
|
pace, you will have another book to review.
|
|
|
|
|
|
A: Why people are willing to reject the concept of beneficial viruses or
|
|
artificial life in general?
|
|
|
|
FC:
|
|
|
|
I don't care to speculate further on peoples' motives at this time, but as
|
|
a general guide, we might consider that people have emotions and that their
|
|
motives are often complex and poorly understood. I have had people tell me
|
|
that I am paving a road to hell with my good intentions, but I cannot tell
|
|
which of us is really doing that because I am not omniscient. I just walk the
|
|
path that seems right to me and try to understand the implications before I
|
|
make big decisions.
|
|
|
|
|
|
A: Do you think that there is anything unethical in claims that beneficial
|
|
viruses exist?
|
|
|
|
FC:
|
|
|
|
I think it is unethical to claim that there are NO benevolent viruses when
|
|
we all know that they do exist and have seen published examples. The ethical
|
|
questions in any research come from the analogy to the two edged sword
|
|
described above. I feel we have a responsibility to present both sides of
|
|
the issue, to consider the implications of our work and how it will impact
|
|
others, and to consider these issues deeply and carefully before proceeding.
|
|
|
|
To me, it is very strange that people complain about my publishing results
|
|
on benevolent viruses. After all, I got a lot of complaints in the 1980s
|
|
about publishing results on malicious viruses, including over 40 papers in
|
|
that period on protection against viruses. My conclusion is that the people
|
|
complaining about the ethical issues are more often than not, expressing
|
|
their frustration that somebody else thought of an interesting new line of
|
|
research and published the results despite its somewhat negative impact on
|
|
their research. Every once in a while, there may be an ethical issue worth
|
|
bringing up, but it is patently ridiculous to claim that it is unethical to
|
|
publish results of research into useful applications of computer viruses.
|
|
But then, people also claim we should not publish results on useful
|
|
applications of nuclear physics because there are nuclear weapons.
|
|
|
|
|
|
\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|
|
|
|
|
Take care of the means and the ends will take care of themselves.
|
|
|
|
- Mahatma Gandhi -
|
|
|
|
|
|
\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|/\|
|
|
|
|
|
|
Article Review:
|
|
---------------
|
|
|
|
TRENDS IN COMPUTER VIRUS RESEARCH
|
|
=================================
|
|
|
|
by Dr Frederick B. Cohen
|
|
|
|
|
|
In this paper (published in 1991.) Fred Cohen discusses current trends in
|
|
computer virus research. The article is an excellent reading for those who
|
|
want to get a short insight in entire Fred Cohen's work.
|
|
|
|
The text can be roughly divided in two parts. In the first part the author
|
|
gives a quick review of history of malicious viruses and defensive methods
|
|
against that type of computer viruses. The second part deals with benevolent
|
|
viruses and the design of useful viruses in practice. The article is closed
|
|
by discussing future research topics.
|
|
|
|
Malicious Viruses and Defense
|
|
-----------------------------
|
|
|
|
This part begins with a short insight to the history of malicious viruses'
|
|
attacks. The term is referred mostly to the population of IBM PC/DOS viruses
|
|
which started to appear in large numbers since 1987. The author call those
|
|
viruses - "real-world viruses".
|
|
|
|
In the further text the preview of defense methods against malicious viruses
|
|
is given. The vulnerabilities and advantages of several well known ideas are
|
|
discussed. It is stated that all built-in self-test techniques are vulnerable
|
|
to a generic attack, i.e. when the virus activates before program being
|
|
attacked and forges the operating environment so that altered information
|
|
seems to be unaltered to the protection system. According to the author the
|
|
most effective protection against malicious computer viruses is defense-in-
|
|
depth. In this approach many approaches are combined, so if one technique
|
|
fails, redundant techniques provide added coverage. The combined use of virus
|
|
monitors (scanners), integrity shells, access controls, virus traps, on-line
|
|
backups, SnapShots ("SnapShoting" of system memory at bootup and performing
|
|
a complete replacement of the system state with the known state from a
|
|
previous bootstrap), BootLocks (providing low-level remapping of disk areas
|
|
to prevent bootstraping mechanisms other than the BootLock mechanism from
|
|
gaining logical access to the DOS disk) and ad-hoc techniques should provide
|
|
reliable protection against operation, infection, evasion and damage by known
|
|
and unknown viruses. Disadvantage of such an approach is space/time
|
|
consumption when realized entirely in software. It is pointed out that
|
|
performance of defense system can be greatly enhanced through hardware based
|
|
implementations.
|
|
|
|
Benevolent viruses and further research
|
|
---------------------------------------
|
|
|
|
In the second part the author introduces the concept of benevolent virus. He
|
|
explains that computer viruses are some of the fastest distributed programs.
|
|
They distribute freely, easily and evenly throughout a computing environment.
|
|
The hardest problem in parallel processing is efficient uniform distribution
|
|
of computing between computers working together on the same problem. With
|
|
computer viruses the solution of this problem is easier because of their
|
|
ability to replicate and spread. It is, however, important to know that the
|
|
problem of controlling virus growth must be addressed before widespread use
|
|
of viruses in existing computer networks.
|
|
|
|
To avoid confusion, the author gives his famous definition of computer virus
|
|
from the paper "Computer Viruses - Theory and Experiments" (published 1984.):
|
|
|
|
"We define a computer 'virus' as a program that can 'infect' other programs
|
|
by modifying them to include a possibly evolved copy of itself."
|
|
|
|
There is also description of worm:
|
|
|
|
"...so-called "worm" programs would install segments on computers which were
|
|
not in use, performing "segments" of the parallel processing problem being
|
|
solved..."
|
|
|
|
The author's formal definition of computer virus (not presented in this
|
|
article) for mathematical reasons encompasses all self-replicating programs
|
|
and programs that evolve and move through a system or network, thus putting
|
|
many of the worm programs under the formal description of computer virus.
|
|
|
|
The short history of theoretical and experimental work on self-reproducing
|
|
programs is given. The two examples of useful computer viruses are presented.
|
|
|
|
One example is The Viral Bill Collector. It is a distributed program which
|
|
allows to the user to avoid a large centralized bureaucracy which controls
|
|
and directs all activities, by distributing all functions to the individual
|
|
bill collectors. The computing environment "births" and "kill" collectors
|
|
according to the current requirements.
|
|
|
|
The second example is Maintenance Virus. To reduce manual system
|
|
administration, maintenance viruses are implemented. They replicate
|
|
themselves in limited numbers, seek out known imperfections and repair them.
|
|
|
|
The author points out that "birth/death" processes are central to the problem
|
|
of designing viruses that do not run amok, as well as to the evolution of
|
|
viral system over time.
|
|
|
|
Some other future improvements of useful viruses as random variation and
|
|
selective survival are discussed. It is stated that in the same way as we can
|
|
generate computer program from specifications, we can generate evolutionary
|
|
systems from specifications, and assure to reasonable degree that they will
|
|
act within predefined boundaries. The author regretfully notices that viruses
|
|
have gotten a bad name, partly because there are so many malicious and
|
|
unauthorized viruses operating in the world. He offers as possible solution
|
|
of this problem the "Computer Virus Contest" which rules prohibit the use of
|
|
viruses that have been released into uncontrolled environments, viruses
|
|
placed in systems without explicit permission of the owner and viruses
|
|
without practical mechanisms to control their spread.
|
|
|
|
The author concludes that "just as biological viruses can cause disease in
|
|
humans, computer viruses can cause disease in computer systems, but in the
|
|
same sense, the benefits of biological research on the quality of life is
|
|
indisputable, and the benefits of computer virus research may same day pay
|
|
off in the quality of our information systems, and by extension, our well
|
|
being."
|
|
|
|
Further reading:
|
|
----------------
|
|
I would recommend this article for the start to those who want to get
|
|
acquainted with Fred Cohen's work. The next step could be the book "A Short
|
|
Course on Computer Viruses" where the same themes are presented in more
|
|
details. According to personal wishes, one can continue either going further
|
|
with the theory by reading Fred Cohen's Ph.D thesis or some of his articles
|
|
with formal definition of computer virus, or to find some practical solutions
|
|
of viral and security problems in some of numerous Fred Cohen's articles with
|
|
that subjects. Personally, I am waiting impatiently to read the newest book
|
|
"It's Alive!".
|
|
|
|
|
|
^^^&&&^^^&&&^^^&&&^^^&&&^^^&&&^^^&&&^^^&&&^^^&&&^^^&&&^^^&&&^^^&&&^^^&&&^^^
|
|
|
|
The man who fights for his ideals
|
|
is the man who is alive!
|
|
|
|
- Miguel de Cervantes -
|
|
|
|
^^^&&&^^^&&&^^^&&&^^^&&&^^^&&&^^^&&&^^^&&&^^^&&&^^^&&&^^^&&&^^^&&&^^^&&&^^^
|
|
|
|
|
|
THE MYSTERY - MARK LUDWIG
|
|
=========================
|
|
|
|
Reading the following text from the article published in Crypt Newsletter No
|
|
22, I got curious. Yes, I have heard the name Mark Ludwig earlier, but it
|
|
always had some negative connotation. This article was somewhat different...
|
|
|
|
|
|
[ IN THE READING ROOM: "COMPUTER VIRUSES, ARTIFICIAL LIFE AND EVOLUTION"
|
|
BLASTS EVOLUTIONARY SCIENCE WITH THEORETICAL PHYSICAL METHODS
|
|
|
|
Just after Christmas, on December 27th, Addison-Wesley France was served with
|
|
a temporary legal notice prohibiting the distribution of its recently
|
|
published French language edition of Mark Ludwig's "Little Black Book of
|
|
Computer Viruses, Volume 1." Entitled "Naissance d'un Virus" or "Birth of a
|
|
Virus," the French edition was selling for about $50 cash money. The company
|
|
is also distributing a disk containing copies of Ludwig's TIMID, INTRUDER,
|
|
KILROY and STEALTH viruses separately for a few dollars more.
|
|
|
|
However, before the ink was dry on the paper a French judge dismissed the
|
|
complaint, said Ludwig between laughs during a recent interview. Addison
|
|
-Wesley France, he said, subsequently worked the fuss into good publicity,
|
|
enhancing demand for "Naissance d'un Virus."
|
|
|
|
Almost simultaneously, Ludwig has published through his American Eagle
|
|
corporation, its follow-up: "Computer Viruses, Artificial Life and
|
|
Evolution," which will come as a great surprise to anyone expecting "The
|
|
Little Black Book of Computer Viruses, Part II."
|
|
|
|
For those absent for the history, "The Little Black Book of Computer
|
|
Viruses," upon publication, was almost uniformly denounced - by the orthodox
|
|
computer press - as the work of someone who must surely be a dangerous
|
|
sociopath.
|
|
|
|
Most magazines refused to review or mention it, under the working assumption
|
|
that to even speak about viruses for an extended length - without selling
|
|
anti-virus software - only hastens the digital disintegration of the world.
|
|
Ludwig found himself engaged in a continued battle for advertising for his
|
|
book, losing contracts without notice while the same publications continued
|
|
to stuff their pages with spreads for cosmological volumes of pornography.
|
|
This has always been a curious, but consistent, hypocrisy.... ]
|
|
|
|
|
|
...Later in the same text there were few words about the author...
|
|
|
|
|
|
[...Not surprisingly, the controversy has kept sales of "The Little Black
|
|
Book" brisk since its initial printing and financed the expansion of American
|
|
Eagle.
|
|
|
|
Which brings us, finally, to "Computer Viruses, Artificial Life and
|
|
Evolution," a book which takes a hard scientific look at life and the theory
|
|
of evolution, and only incidentally contains working viruses.
|
|
|
|
To grapple with the underlying philosophy behind "CVAL&E," its helpful to
|
|
know Ludwig was a physics major at Caltech in Pasadena, CA, at a time when
|
|
Nobel-laureate theoretical physicists Richard Feynman and Murray Gell-Mann
|
|
were in residence. The ruthlessness with which these scientists dealt with
|
|
softer disciplines not up to the task of thorough theoretical analysis
|
|
coupled with the academic meat-grinder that is Caltech's reputation, casts
|
|
its shadow on "CVAL&E."
|
|
|
|
Ludwig writes in the introduction:
|
|
|
|
". . . Once I was a scientist of scientists. Born in the age of Sputnik, and
|
|
raised in the home of a chemist, I was enthralled with science as a child.
|
|
If I wasn't dissolving pennies in acid, I was winding an electromagnet, or
|
|
playing with a power transistor, or . . . freezing ants with liquid propane.
|
|
When I went to MIT for college I finally got my chance to totally immerse
|
|
myself in my first love. I did rather well at it too, finishing my
|
|
undergraduate work in two years and going on to study elementary particle
|
|
physics under Nobel laureates at Caltech. Yet by the time I got my doctorate
|
|
the spell was forever broken . . . I saw less and less of the noble scientist
|
|
and more and more of the self-satisfied expert."...]
|
|
|
|
|
|
...Well, at this point I decided to contact Mark Ludwig and ask him some
|
|
questions. Here is he, answering exclusively for "Alive":
|
|
|
|
|
|
A: Why did you get interested in computer viruses?
|
|
|
|
ML:
|
|
|
|
I thought they were interesting as genetic, self-reproducing entities, and
|
|
I just wanted to learn something about them, as a scientist. What little I
|
|
could find out about artificial life seemed very much skewed toward the
|
|
evolutionary point of view, which is in my mind more philosophy than good
|
|
science. Since computers are universal simulating machines, I think one thing
|
|
AL [Artificial Life] researchers can get into is a sort of programmatic story
|
|
telling which has little to do with reality. I mean, of course you can design
|
|
something to evolve (Lamarkian or Darwinian) just because you have an
|
|
universal simulating machine. But does that have anything to do with real
|
|
life?
|
|
|
|
I saw viruses as a real-life phenomenon, rather than a laboratory construct.
|
|
Perhaps they are the only "life-form" apart from earth's carbon-based life
|
|
we will ever meet. Laboratory AL experiments tend to be contrived because
|
|
the researcher's intelligence inevitably enters in. Viruses, as a phenomenon,
|
|
are somewhat different. They're in the wild. What do they do there? Do they
|
|
evolve? Can they evolve? The whole question just seemed fascinating to me.
|
|
|
|
|
|
A: When did you start to deal with computer viruses and could you describe
|
|
shortly your work?
|
|
|
|
ML:
|
|
|
|
About 1988 or 1989. Given the above interest, the natural thing to do seemed
|
|
to be to get some viruses and learn about them. That proved to be a real
|
|
challenge though. Technical knowledge of this field was very hush-hush then.
|
|
I ended up solving the problem by setting up a BBS and announcing that I'd
|
|
send people $20 if they'd send me a virus. So I got a few that way. But I
|
|
realized it was going to be hard to discuss my scientific interests with
|
|
anyone if no one understood the technology behind viruses. Furthermore, I
|
|
did not believe that this silence was best for mankind in the long run. I
|
|
mean, here is this brand new technology -computers & information science-
|
|
and a brand new phenomenon -viruses- and all anybody wanted to do was to make
|
|
it go away. As a scientist, I was much more inclined to explore the
|
|
possibilities. Yet I knew I couldn't possibly do that alone if we're really
|
|
going to find out what uses these things might have, or what understanding
|
|
they might actually contribute to other scientific disciplines. Science
|
|
doesn't work like that now-a-days. The knowledge has to be more generally
|
|
available before anyone could even begin to think along these lines. So I set
|
|
out to make that knowledge accessible.
|
|
|
|
|
|
A: Why did you write "The Birth of a Virus" ?
|
|
|
|
ML:
|
|
|
|
"The Birth of a Virus" is the French edition of "The Little Black Book of
|
|
Computer Viruses." I plainly wrote it so that the average programmer could
|
|
learn the basics of how a virus operates. That was published in 1991. It is
|
|
not intended to be a compendium of all the tricks virus programmers use, or
|
|
anything like that. It is an introduction. The viruses discussed in the book
|
|
(4 of them) are pretty basic, but they get some of the basic techniques
|
|
across, and illuminate the issues which a virus must face to reproduce.
|
|
|
|
|
|
A: Why did you write "Computer Viruses, Artificial Life and Evolution"?
|
|
|
|
ML:
|
|
|
|
CVALE is a first stab at discussing my original interest in viruses. It
|
|
discusses questions like "Are viruses alive?" and digs into viral evolution,
|
|
comparing viruses to real-world organisms, etc. It's about more than just
|
|
viruses, though. It's about the whole Artificial Life movement, as well as
|
|
science and philosophy. Really, I think what I've seen in staring hard at
|
|
viruses might be very valuable in bringing about a revolution in evolutionary
|
|
biology. Using carbon-based organisms is a horrible way to study evolution.
|
|
They're too complex and we don't understand them well enough. The time frames
|
|
of evolution are too large. And deep philosophical questions rear their heads
|
|
all over the place. Inside the computer, most of these difficulties just
|
|
vanish. The one thing you have to be careful of is the universal nature of
|
|
the computer. What you don't want is to create some kind of science that will
|
|
always confirm itself. Looking at viruses can teach us how to impose some of
|
|
the checks and balances that science needs to be valid.
|
|
|
|
|
|
A: Do you think that your work is unethical or illegal?
|
|
|
|
ML:
|
|
|
|
Illegal? Some people tell me that it is in some parts of the world. Certainly
|
|
it is not illegal in the US.
|
|
|
|
Unethical? That is a more difficult question. I don't think so, but I'm open
|
|
to correction. I mean, I realize that by publishing viruses, somebody could
|
|
use that information to hurt somebody else. It's not my intention to empower
|
|
would-be criminals. At the same time, I think a lot of people can get hurt
|
|
because people who should have the technical expertise to deal with malicious
|
|
viruses don't have it and have a hard time getting it. The idea that you can
|
|
combat a human intelligence with a piece of software is ludicrous. Anybody
|
|
who just installs an anti-virus and sits back on his laurels is asking for
|
|
trouble. At least some virus writers are intelligent people. And the only way
|
|
to combat a human intelligence is with human intelligence. In other words,
|
|
you start with first hand knowledge of what viruses are and how they work.
|
|
Given that first hand knowledge, you can reasonably choose anti-virus
|
|
software to protect your systems, etc., but you don't just pick the program
|
|
based on some advertisement, or some review that purports to be unbiased,
|
|
albeit written by an a-v developer or by some peon at an advertiser-driven
|
|
magazine. Thus, I see my work as being potentially very beneficial in that
|
|
it brings education and light where darkness has been.
|
|
|
|
|
|
The only way I can see to answer the ethics question is to weigh the merits
|
|
and dismerits of what I'm doing. I've always taken the attitude that I'll
|
|
do this on a tentative basis, but if it proves out that people are taking
|
|
my stuff and wreaking havoc with it, I'd be the first one to condemn it.
|
|
Now, 3 years after the release of The Little Black Book, I think I can say
|
|
safely that people are not, for the most part, running out to destroy the
|
|
world with it. They are behaving responsibly.
|
|
|
|
We do not make it illegal to manufacture hammers or knives because people do,
|
|
occasionally, kill other people with those implements. We do not call the
|
|
knife manufacturer immoral or unethical. Killing someone or not with them
|
|
is the responsibility of the user, not the manufacturer.
|
|
|
|
I fail to see why viruses should be treated differently. The a-v community
|
|
argues that there is no such thing as a good virus, ergo there is no benefit
|
|
side to the equation, as in the case of a hammer. Even if they were right on
|
|
that point, though, it would not be logical to conclude, therefore, that
|
|
making information about viruses available is therefore also bad. Someone
|
|
who learns about viruses -who gets the first hand knowledge about them- is
|
|
going to be a whole lot better at facing a malicious virus running amok in
|
|
a network than somebody who simply sits back and lets somebody else, e.g. an
|
|
anti-virus company, do his job for him. The second person will in all
|
|
likelihood need expert help to get rid of the virus. The first will be the
|
|
expert to begin with. Thus it seems reasonable to suggest that even if all
|
|
viruses were only evil (which I do not believe), it could still be very good
|
|
to make the knowledge of them available, because in so doing you are teaching
|
|
people how they work and giving them the expertise to fight them better. As
|
|
far as I can see, the benefits do outweigh the dangers here.
|
|
|
|
I think when considering the ethics of all of this, we have to realize that
|
|
the a-v community is trying to partake of a new ethic which, if carried to
|
|
its logical conclusions, will have a chilling effect on all innovation and
|
|
all human initiative. You see this new ethic throughout society. It damns
|
|
anything which could potentially be harmful before you even know whether it
|
|
will be beneficial or not. I don't care whether you're talking about a-v or
|
|
environmentalism or about the latest drive to socialize medicine in the US,
|
|
this mindset is behind it. The bottom line is an attempt to create a
|
|
risk-free socialist world controlled by a technical elite. Now, you can't
|
|
stop hammers with this approach, but you can sure stifle anything new,
|
|
because you can magnify the risks, and diminish the benefits, and people
|
|
don't have an intuitive feel for it.
|
|
|
|
The truth is that people who reason this way are trying to make gods out of
|
|
themselves. They are not content to let their opinions be opinions. Rather
|
|
they try to elevate them into moral truism. A lot of people in the west
|
|
still have a love-affair with socialism, so they buy into this risk-free
|
|
attitude without questioning it much. We shouldn't be deceived by such
|
|
propaganda though.
|
|
|
|
|
|
A: What problems did you have in presentation of your work?
|
|
|
|
ML:
|
|
|
|
Well, nobody wanted to print it. But it was not that big of a deal since I
|
|
already owned a publishing company which published other books for university
|
|
classes. I just had to decide whether we should get into this line or not.
|
|
I've had enough experiences in other fields of science to know that if you
|
|
want to do anything new you're going to meet resistance. I haven't run into
|
|
any problems I didn't expect from the start.
|
|
|
|
|
|
A: Why people are willing to reject the concept of beneficial viruses or
|
|
artificial life in general?
|
|
|
|
|
|
Most people don't reject the idea of a beneficial virus if you discuss it
|
|
with them intelligently. Rather, they become open to it rather quickly.
|
|
There's a certain amount of inertia you have to overcome to get people to
|
|
actually install a beneficial virus, though, because they've been brainwashed
|
|
into believing that virus = bad. Once you get past that, it's not a problem.
|
|
|
|
Now, obviously, I won't say the same of the anti-virus community. Here you
|
|
have a case of group-think where everyone just echoes everyone else's
|
|
opinion. It's kind of like an extreme political party. Breaking ranks will
|
|
get you ostracized. They are the ones who've been trying to brainwash people,
|
|
and they want to keep it up because they are pushing an agenda that puts them
|
|
in the driver's seat. They know full well that to make any concession in
|
|
their position is to open the floodgates. How will you ever pass legislation
|
|
against the free dissemination of virus-related information once you admit
|
|
that some of it might be beneficial? You won't. So they'll fight the idea of
|
|
a beneficial virus to their dying breath.
|
|
|
|
Artificial Life is a different matter, though. I think a lot of people reject
|
|
the concept in its strong form for religious or philosophical reasons.
|
|
Furthermore I think those reasons are completely valid. I mean, IF you accept
|
|
the idea that life is nothing more than atoms and physics, it makes sense to
|
|
define life functionally and then design something functionally equivalent
|
|
and call it life. However that IF is a big if. There are plenty of reasons
|
|
not to do that, both philosophical and purely scientific. Most of the people
|
|
doing AL work just leap right in like good positivists and sweep the deeper
|
|
questions under the rug. If AL is ever to garner widespread support, those
|
|
who study it are going to have to be more sensitive to the philosophical
|
|
issues. I tried to do that in my book, though I haven't gotten a whole lot
|
|
of feedback as to how well I succeeded.
|
|
|
|
|
|
A: Are there persons in virus/anti-virus field that you respect and why?
|
|
|
|
ML:
|
|
|
|
Technically there are quite a few people I respect. Writing viruses and
|
|
anti-viruses is kind of like a programmer's version of a grand master's
|
|
chess game. You need both a good deal of skill and a sense of the art of it
|
|
to play on either side.
|
|
|
|
|
|
Intellectually, I don't have very much respect for many of the people who've
|
|
made a name for themselves in a-v work. Many of them aren't thinking for
|
|
themselves anymore. They've made up their minds and they won't hear new
|
|
ideas. They're like politicians who are so committed to a movement that they
|
|
don't dare change, and they stagnate intellectually as a result.
|
|
|
|
There are a whole lot of people a step below the big names, though, who
|
|
are just good people trying to keep the computers in their companies clean
|
|
and what not. They aren't pushing an agenda - they're just trying to get
|
|
their job done. They're open minded and they will listen to new ideas.
|
|
I respect these people a lot, and it's my sincere desire to help them get
|
|
their job done. By making technical information about viruses available,
|
|
I'd like to believe that I'm doing that.
|
|
|
|
|
|
!{**}!{**}!{**}!{**}!{**}!{**}!{**}!{**}!{**}!{**}!{**}!{**}!{**}!{**}!{**}!
|
|
|
|
|
|
And God saw that it was good. And God blessed them,
|
|
saying 'Be fruitful and multiply'
|
|
|
|
-Genesis 1:21,22
|
|
|
|
(The dedication to Mark Ludwig's "Little Black Book about Computer Viruses")
|
|
|
|
|
|
!{**}!{**}!{**}!{**}!{**}!{**}!{**}!{**}!{**}!{**}!{**}!{**}!{**}!{**}!{**}!
|
|
|
|
|
|
IT CONQUERED THE WORLD: A FICTION EXCERPT FROM MARK LUDWIG'S "CVAL&E,"
|
|
=======================================================================
|
|
FOR YOUR ENJOYMENT
|
|
==================
|
|
|
|
[Warning: Sections of the following may seem morbid and unpleasant.]
|
|
|
|
Cast 50 years in the future . . .
|
|
|
|
"Atomic storage technology was developed and put to work in computers 40
|
|
years ago. Five years later the first notebook computers with 100 terabytes
|
|
of pico-second access, non-volatile storage became available for under $5000.
|
|
|
|
Of course, software lagged far behind hardware. For nearly 20 years, the
|
|
software giants battled it out developing operating systems to make effective
|
|
use of the storage technology. In fact, operating systems proliferated to
|
|
such an extent that real progress in programming gave way to brute
|
|
competition between operating systems. By and by, IBM came up with the
|
|
solution. Their OS/4 operating system was an incredible engineering feat.
|
|
About 1.2 terabytes of code, fully interactive speech recognition, touch and
|
|
vision interface, artificial reality feedback. But the clincher was the
|
|
artificial intelligence which allowed the operating system and applications
|
|
to adapt to both the individual user and the software developer. It was a
|
|
cinch to write very complex programs in this environment because of the
|
|
artificial intelligence, despite the fact that there were nearly 2 million
|
|
possible system calls. Shareware proliferated for it, and then commercial
|
|
programs that would boggle the mind of anyone just ten years earlier.
|
|
|
|
"By 2045, OS/4 was the _de facto_ standard. There weren't even any close
|
|
competitors. Nobody even had any interest in new operating systems, because
|
|
this one seemed to fit everyone's needs so well. It seemed to be the golden
|
|
age of computing, except for one thing. OS/4 had some anti-virus measures
|
|
built into it. They worked pretty well. However, a fairly simple but benign
|
|
virus appeared in this environment that those anti-virus measures couldn't
|
|
cope with. This virus was only about 2 megabytes in size, and since it was
|
|
benign, nobody cared much about it. However, at the time the United States
|
|
had become a tyranny whose evils had eclipsed even those of Stalin and
|
|
Hitler. Most intelligent people had fled the country long ago. The
|
|
government went on a crusade to find the author of the virus. They got their
|
|
man, and subjected him to functional re-engineering at the hands of
|
|
nano-robots. A horrible fate. This focused quite a bit of attention on the
|
|
virus and its alleged author. To defend this poor scapegoat, a team of
|
|
scientists got together and proved that just such a virus should evolve into
|
|
a useful clean-up utility if left alone.
|
|
|
|
"A couple weeks later IBM released a supplementary anti-virus utility to take
|
|
care of the problem. Even though the scientists said not to worry, a lot of
|
|
people wanted the virus out, and IBM saw this as a good way to make a moral
|
|
statement about virus writing that would make a number of governments happy.
|
|
This . . . was the beginning of the end, though. A typical case of the quick
|
|
fix. No one took the time to disassemble the virus. Nobody listened to the
|
|
team of scientists.
|
|
|
|
"Until that anti-virus utility was released, there was little evolutionary
|
|
pressure on the virus, and most of it caused evolution in beneficial ways.
|
|
The utility was quite adept at putting pressure on the virus to make it
|
|
malevolent, though. And the virus mutated with incredible ease . . . If that
|
|
were not enough, the artificial intelligence of the anti-virus only succeeded
|
|
in driving the viruses - which also used system AI resources - to become
|
|
smarter and more prolific. The anti-virus was made available on a Monday,
|
|
free of charge to the general public. By Wednesday, the whole world was in
|
|
chaos. Everything was shut down. Financial markets. Communications.
|
|
Hospitals. The works. Nobody went to work. People were dying . . ."
|
|
|
|
(c)opyright 1993 American Eagle Publishing. Used with permission.
|
|
|
|
|
|
&&**&&**&&**&&**&&**&&**&&**&&**&&**&&**&&**&&**&&**&&**&&**&&**&&**&&**&&**
|
|
|
|
The disciples asked the master:
|
|
|
|
- What will happen with you after your death?
|
|
|
|
- I will go to the hell.
|
|
|
|
- But, they think that you are very holy master!
|
|
|
|
- If I don't go to the hell, how can I help you?
|
|
|
|
- Zen text -
|
|
|
|
&&**&&**&&**&&**&&**&&**&&**&&**&&**&&**&&**&&**&&**&&**&&**&&**&&**&&**&&**
|
|
|
|
|
|
[ The book review of "Computer Viruses, Artificial Life & Evolution" and "It
|
|
Conquered The World" originally appeared in the February 1994 issue of The
|
|
Crypt Newsletter. They are reprinted in "Alive" with permission of Crypt's
|
|
editor George Smith (Urnst Kouch). The Crypt Newsletter is a monthly
|
|
publication featuring science news, media reviews and comment of interest to
|
|
a computing audience. E-mail: ukouch@delphi.com ]
|
|
|
|
|
|
Editor's note:
|
|
--------------
|
|
|
|
The "underground" versions of The Crypt Newsletter contain source code of
|
|
some viruses. It is disputable if they are beneficial or not. The "clean"
|
|
versions (without virus code) are available on Compuserve.
|
|
|
|
|
|
~~~***~~~***~~~***~~~***~~~***~~~***~~~***~~~***~~~***~~~***~~~***~~~***~~~
|
|
|
|
|
|
THE REALITY - VESSELIN BONTCHEV
|
|
===============================
|
|
|
|
Many people know the name Vesselin Bontchev from discussions on Virus-L/
|
|
comp.virus. His formal biography says:
|
|
|
|
In 1988 Mr Bontchev became interested in computer viruses and soon afterwards
|
|
his freeware anti-virus programs were the most popular in Bulgaria. In 1990
|
|
he became the director of the Laboratory of Computer Virology at the
|
|
Bulgarian Academy of Sciences - a laboratory, created mainly due to his
|
|
efforts. Since 1991 he is working on his Ph.D. thesis in the Virus Test
|
|
Center at the University of Hamburg, Germany.
|
|
|
|
Since 1990 Mr Bontchev is the Bulgarian representative in IFIP's TC-11
|
|
(Computer Security). He is also a founding member of CARO (the Computer
|
|
Anti-virus Researchers' Organization), a founding member of VSI (the Virus
|
|
Security Institute), and a member of EICAR (the European Institute for
|
|
Computer Anti-virus research).
|
|
|
|
Mr Bontchev's main fields of interest include computer viruses, computer
|
|
security, integrity and data protection, encryption, number theory....etc.
|
|
|
|
Leaving formalities for a moment, Vesselin Bontchev speaks for "Alive"
|
|
exclusively:
|
|
|
|
A: Why did you get interested in computer viruses?
|
|
|
|
VB:
|
|
|
|
Initially - because they are interesting, of course. I mean, they are
|
|
challenging; doing something that is unusual and clever. Later I discovered
|
|
that my knowledge in this field can help many other people and this motivated
|
|
me additionally.
|
|
|
|
A: When did you start to deal with computer viruses and could you describe
|
|
shortly your work?
|
|
|
|
VB:
|
|
|
|
It all began in the Spring of 1988. At that time I was working on a voluntary
|
|
basis as a consultant for the only Bulgarian computer-related magazine -
|
|
"Komputar za vas" ("Computer for You"). I was asked to provide some help in
|
|
translating a German article (from the German magazine "CHIP", I believe)
|
|
about computer viruses. I didn't know German at all, but I knew a lot about
|
|
computers. The article was initially translated by a professional translator,
|
|
who knew German perfectly, but knew nothing about computers and the special
|
|
jargon used in this area. There was a lot of funny stuff in the draft
|
|
translation... But I digress.
|
|
|
|
In short, the article was about computer viruses. I read it, and the subject
|
|
captivated me at once. Knowing from personal experience that the quality of
|
|
the information obtained from such sources as popular magazines tends to be
|
|
rather low, I used the information system of the Bulgarian Central Institute
|
|
for Scientific and Technical Information to do a library search by keywords
|
|
and then to read all available serious journals that had some articles on
|
|
this subject. The most valuable source of information proved to be "Computers
|
|
& Security", and in particular the papers from Dr. Fred Cohen and Prof.
|
|
Harold Highland - two of the very few people that seemed to know what they
|
|
were talking about.
|
|
|
|
After reading all that was available to me at that time (not that much; there
|
|
weren't so many articles published on this subject at that time), I decided
|
|
that while an interesting mental exercise, computer viruses couldn't be that
|
|
dangerous, because every moderately competent computer techie should be able
|
|
to spot them at once. Also, it was obvious that all the hype in the popular
|
|
media was caused mostly by people who knew near to nothing on the subject.
|
|
Even the viruses that existed at that time didn't seem anything particularly
|
|
clever - I remember that when I read the description of Brain, I spent long
|
|
time wondering what the *other* part of the code could do, because it was
|
|
clear to me that anybody with some experience in assembly language
|
|
programming could fit the described functionality into less than one kilobyte
|
|
of code - so what were the other 2 Kb of the virus *doing*?
|
|
|
|
In short, I wrote an article for "Komputar za vas", explaining my view that
|
|
computer viruses can't be a real threat. What I have overlooked was that by
|
|
far not all computer users are technical experts who know by heart the
|
|
internals of their machines... Just a couple of days after my article was
|
|
published, two guys came at the editor's office of the magazine and proudly
|
|
announced that they have found a virus! It was what we are calling now
|
|
Vienna.648.Reboot.A, but nobody knew it at that time. The two guys had
|
|
already dealt with the infection in the company they were working for (they
|
|
were system programmers, after all) and demonstrated us how well their
|
|
custom-made disinfector works... disinfecting the only copy of the virus left
|
|
in their disposition. Of course, I wanted to examine "the beast" and to
|
|
understand how exactly it works and why. The problem was, it was already
|
|
gone! I visited the office in their company, and after a long and fruitless
|
|
search for an infected file, we finally found a piece of paper in the trash
|
|
bin, that contained the hex dump of an infected file... I got that piece of
|
|
paper and entered the code with DEBUG byte-by-byte. Then I disassembled it,
|
|
understood it, wrote my own disinfector (and even a vaccine) for it... This
|
|
is how it all began for me. My second case was Cascade, then Ping_Pong, then
|
|
the Bulgarian viruses began to appear (Old_Yankee, Yankee_Doodle), and then
|
|
came the Dark Avenger...
|
|
|
|
My work now? Well, I am working in the Virus Test Center at the University
|
|
of Hamburg, under the leadership of Prof. Klaus Brunnstein. I am in charge
|
|
of maintaining our virus collection. I am also analysing viruses, helping
|
|
people who are asking virus-related questions from all parts of the world,
|
|
writing my Ph.D. thesis, testing anti-virus products, and many other less
|
|
exciting things.
|
|
|
|
A: Why did you leave Bulgarian anti-virus scene and moved to Germany?
|
|
|
|
VB:
|
|
|
|
Because I was proposed the wonderful opportunity to live and work under
|
|
excellent working conditions in place with a very high reputation in the
|
|
computer anti-virus field - and also to get a Ph.D. there.
|
|
|
|
A: Are you familiar with present virus/anti-virus situation in Bulgaria?
|
|
|
|
VB:
|
|
|
|
It depends on your definition of "familiar". I have a pretty clear idea of
|
|
what is happening there, although I am not as much familiar with the
|
|
virus/anti-virus scene there as I used to be.
|
|
|
|
|
|
A: It is known that certain animosity existed between you and Bulgarian
|
|
virus writer known as Dark Avenger some time ago.
|
|
|
|
VB:
|
|
|
|
That is put very mildly, yes.
|
|
|
|
A: What do you think about him today?
|
|
|
|
VB:
|
|
|
|
The same bad things I've been always thinking about him. Sorry, but my
|
|
education does not allow me to list them here.
|
|
|
|
A: What is your general opinion about virus writers?
|
|
|
|
VB:
|
|
|
|
Most of them are just irresponsible juvenile people (I am tempted to say -
|
|
kids), who want to "establish" themselves and to impress their peers, by
|
|
doing things that they perfectly know are regarded as "bad" by the society,
|
|
but for which, as they also know very well, this same society is unlikely to
|
|
be able to punish them. They like so much to brag about their "exploits" and
|
|
"civil liberties", but it is actually the same old graffiti writing, only in
|
|
a more modern, electronical form. In short - vandals.
|
|
|
|
A: What do you think about beneficial viruses and artificial life? Why are
|
|
people willing to reject the concept of beneficial viruses and artificial
|
|
life in general?
|
|
|
|
VB:
|
|
|
|
I don't feel competent to comment about artificial life, because I am not
|
|
expert in this area. I don't believe that computer viruses are a form of
|
|
artificial life, however.
|
|
|
|
People don't like to even hear about the so-called "beneficial viruses"
|
|
mostly because the term "computer virus" is already loaded with negative
|
|
meaning in the public opinion - maybe incorrectly, just like the term
|
|
"hacker", but that's it how it is. I would suggest to anybody who is doing
|
|
serious and responsible research in the field of self-replicating code, to
|
|
use some other term, if they don't want to be misunderstood by the general
|
|
public. After all, what Dr. Cohen is understanding under the term "beneficial
|
|
virus" is *very* different from those nasty little programs that the general
|
|
public is acquainted with.
|
|
|
|
A: Do you think that is unethical to claim that computer viruses can be
|
|
beneficial and why?
|
|
|
|
VB:
|
|
|
|
Now, that's a difficult question... Well, it depends. It depends on what are
|
|
the motives of the person making the claim. Is he a legitimate scientist who
|
|
is trying to use an interesting phenomenon for something useful for the
|
|
humanity? Or is he just an irresponsible person who is looking for an excuse
|
|
for his asocial acts and is trying to masquerade them under the
|
|
scientifically-looking term "research"?
|
|
|
|
However, I think that even the legitimate researcher ought to emphasize that
|
|
he is talking about something completely different from the real computer
|
|
viruses known to the general public - in order not to be misunderstood. Also,
|
|
I think that he should clearly (and loudly) distinguish himself from the
|
|
virus writing crowd. Research - yes, but seriously done, in clear and
|
|
strictly controlled environment, by people who have the knowledge and
|
|
experience to conduct it. Just like the kind of research into biological
|
|
experiments.
|
|
|
|
A: You often mention "real viruses". What are they and how are they related
|
|
to the concept of "beneficial viruses" ?
|
|
|
|
|
|
VB:
|
|
|
|
I am convinced that what most people understand under the term "computer
|
|
virus" cannot be beneficial. When the average user hears the term "computer
|
|
virus", he almost certainly does not have a valid definition for it, but just
|
|
as certainly he has a pretty clear view of what the term is about. I call
|
|
this a "real computer virus". Real computer viruses are always bad.
|
|
|
|
My professional understanding of "real virus" is this:
|
|
|
|
"Something has entered my computer without my authorization and is
|
|
replicating there, potentially doing damage."
|
|
|
|
The accents are on (a) entered without authorization, (b) replicating -
|
|
i.e. modifying executable objects and wasting time and disk space, and (c)
|
|
maybe it is doing damage, maybe it is intentionally, maybe not intentionally.
|
|
|
|
The average user's understanding of "real virus" is probably:
|
|
|
|
"Something is here, I didn't allow it to be here. I've been told it can
|
|
spread like living being and that it can destroy my data/programs. I don't
|
|
like it."
|
|
|
|
Two years ago I asked the net to send me the arguments why they think a
|
|
"good" virus is a bad idea. I have collected dozen reasons. I do not claim
|
|
that computer viruses cannot be beneficial, but any virus that pretends
|
|
to have this property must not violate any of the 12 conditions.
|
|
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|
|
|
Originality and the feeling of one's own
|
|
dignity are achieved only through work
|
|
and struggle.
|
|
|
|
- Dostoevsky -
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|
|
|
|
|
Vesselin Bontchev:
|
|
|
|
DOZEN REASONS WHY A "GOOD" VIRUS IS A BAD IDEA
|
|
==============================================
|
|
|
|
I. Technical points:
|
|
--------------------
|
|
|
|
1. Once released, one has no control on how the virus will spread; it may
|
|
reach an unknown system (or the one which could have even not existed at the
|
|
time the virus is created) and on which it might cause non-intentional
|
|
damage. Any virus that claims to be beneficial, must contain measures to
|
|
prevent this. For instance, if it infects a particular object, it must at
|
|
least keep a cryptographically strong checksum of this object, in order to
|
|
make sure that it does not infect anything else by mistake. And this is only
|
|
a simplistic example; in reality the precautions must be much more
|
|
elaborated.
|
|
|
|
A virus that claims to be beneficial should provide means to be controlled.
|
|
It should be possible to easily prevent the infection even of a system that
|
|
has never heard about the virus; it should be possible to remove the
|
|
infection easily from any infected system, without causing any harm; and it
|
|
should be possible to send a message to all instances of the virus to
|
|
terminate themselves, restoring the infected systems to their uninfected
|
|
state - or to update themselves. Such a message should propagate faster than
|
|
the virus itself. In some sense, those messages will be "viruses" for the
|
|
"computational environment" consisting of all existing copies of the virus,
|
|
just like the virus is a virus in the "normal" computational environment (the
|
|
one that the user uses). If such a solution is implemented, this is still
|
|
dangerous, although the danger is of a different kind. Suppose that a system
|
|
uses the beneficial virus and relies on it. Then a malicious attacker could
|
|
send a message to the virus to terminate itself, thus causing harm to the
|
|
system (a denial of service attack). Therefore, the message should be
|
|
cryptographically authenticated. In short, the virus should be able to
|
|
authentify itself to the system and the system should be able to authentify
|
|
itself to the virus.
|
|
|
|
The user of the beneficial virus should actively invite (e.g. install) the
|
|
virus on his/her system. It is not enough if the virus asks for permission,
|
|
because this forces the user to take some measures in order to keep their
|
|
system virus-free. By default (i.e. if no measures are taken), the virus
|
|
should not infect that system. Only if the virus finds some kind of
|
|
"invitation", it should infect the system. There must be a way to turn off
|
|
the prompting - the user must both be able to set the default action to "no,
|
|
don't infect" (by removing the invitation or not installing it in the first
|
|
place) and to "yes, keep infecting without asking". And again, cryptographic
|
|
means should be used to ensure that what the virus sees as invitation is
|
|
indeed one and not some kind of mistake.
|
|
|
|
No uncontrollable mutations of virus should happen, either of random (errors)
|
|
or deterministic (intentional changes) nature.
|
|
|
|
2. The anti-virus programs will have to distinguish between "good" and "bad"
|
|
viruses, which is essentially impossible. Also, the existence of useful
|
|
programs which modify other programs at will, will make the integrity
|
|
checkers essentially useless, because they will be able only to detect the
|
|
modification and not to determine that it has been caused by a "good" virus.
|
|
Therefore, a virus that claims to be beneficial, must not modify other
|
|
programs.
|
|
|
|
3. A virus will eat up disk space and time resources unnecessarily while it
|
|
spreads. The virus is a self-replicating resource eater. Therefore, a virus
|
|
that claims to be beneficial, should keep only one instance of itself per
|
|
infected machine and the costs of the time and other resources used by it
|
|
must be negligible, compared to the benefits it brings to the user.
|
|
|
|
4. A virus could contain bugs which might damage something or harm somebody.
|
|
Any program could be buggy, but the buggy virus is a self-spreading buggy
|
|
program which is out of control.
|
|
|
|
5. A virus will disable the few programs on the market which check themselves
|
|
for modifications and halt themselves if they have been changed. It is
|
|
important to repeat again that a virus that claims to be beneficial, *must
|
|
not modify* other programs.
|
|
|
|
|
|
Summary of technical points against "good" viruses:
|
|
|
|
-impossibility to control it or possibility to lose control over it
|
|
-uncertainty in discerning "good" from "bad" viruses
|
|
-resource wasting
|
|
-bugs which are harder to detect and easier to spread around
|
|
-modification of programs
|
|
|
|
The above points apply to any practical system of use today, i.e. the systems
|
|
which are based on von Neumann's architecture.
|
|
|
|
|
|
II. Ethical/legal points:
|
|
--------------------------------
|
|
|
|
6. It is unethical to modify somebody's data without his or her active
|
|
authorization. In several countries this is also illegal. The user of a
|
|
beneficial virus must actively invite the virus to infect his or her machine.
|
|
The virus must wait for an invitation, not bother the user with asking for
|
|
permission or sneaking in without one.
|
|
|
|
7. Modifying a program could mean that the owner of the program loses his or
|
|
her rights for technical support, ownership, or copyright. An example of such
|
|
a possibility could be the case reported recently to VTC - Hamburg. The
|
|
company refused technical support to somebody whose system was infected -
|
|
they insisted that their product is re-installed.
|
|
|
|
8. An attacker can use a "good" virus as a means of transportation to
|
|
penetrate a system. That is why a "good" virus must be able to authentify
|
|
itself to the system, and the system must be able to verify that it is
|
|
exactly what it claims to be. A person with malicious intents can furthermore
|
|
get a copy of the "good" virus and modify it to include something malicious.
|
|
Actually, an attacker could trojanize -any- program, but a "good" virus will
|
|
provide the attacker with means to transport his malicious code to a
|
|
virtually unlimited population of computer users. The possibility to
|
|
transport malicious code is one of the things that makes a virus "bad".
|
|
|
|
9. Declaring some viruses as "good" will just give an excuse to the crowd of
|
|
virus writers to claim that they are actually doing "research". Working with
|
|
potentially dangerous things - either poisonous substances or self -repli-
|
|
cating programs - should be left to people who have (a) the moral and ethical
|
|
stability and (b) the technical expertise to do it.
|
|
|
|
10. Anything useful that could be done by a virus, could also be done with
|
|
a normal, non-replicating program. Any virus that claims to be beneficial
|
|
must do something that either cannot be done by a non-viral program, or is
|
|
not done as effectively as with a viral one to avoid problems stated in
|
|
previous points.
|
|
|
|
The summary of ethical/legal points against "good" viruses:
|
|
|
|
-modification of data/programs without active authorization of user
|
|
-possibility to lose ownership rights on infected program
|
|
-possibility to modify a "good" virus with malicious code to transport such
|
|
a code further
|
|
-the question of responsibility of persons writing viruses
|
|
-the question of suitability of "good" viruses to perform a certain task
|
|
|
|
|
|
III. Psychological points:
|
|
--------------------------
|
|
|
|
11. A virus activity ruins the trust that the user has in his or her machine.
|
|
The impression that a virus steals user's control of the machine can cause
|
|
the user to lose his or her belief that she or he can control it. It may be
|
|
a source of permanent frustrations.
|
|
|
|
12. For most people the word "computer virus" is already loaded with negative
|
|
meaning. They will not accept a program called like that, even if it claims
|
|
to do something useful.
|
|
|
|
|
|
*^^^*^^^*^^^*^^^*^^^*^^^*^^^*^^^*^^^*^^^*^^^*^^^*^^^*^^^*^^^*^^^*^^^*^^^*^^^*
|
|
|
|
Those who are good, travel the road that avoids evil;
|
|
so watch where are you going - it may save your life.
|
|
|
|
- Proverbs 16.17 -
|
|
|
|
*^^^*^^^*^^^*^^^*^^^*^^^*^^^*^^^*^^^*^^^*^^^*^^^*^^^*^^^*^^^*^^^*^^^*^^^*^^^*
|
|
|
|
|
|
Vesselin Bontchev:
|
|
|
|
AN EXAMPLE OF BENEFICIAL VIRUS
|
|
==============================
|
|
|
|
...Here is an example of a software package that uses replication to some
|
|
extent and which is without doubt beneficial.
|
|
|
|
Consider a company that has about 1,000 PCs, all networked together in a LAN.
|
|
The company also takes the virus problem seriously, and insists that each and
|
|
every of those PCs must be running the latest version of the SuperDuper Scan,
|
|
before it is allowed to access the network. (Let's ignore for a moment
|
|
whether the decision to rely on a scanner for virus protection is wise or
|
|
not.) This is a very reasonable requirement, because scanners tend to get old
|
|
like nothing else, and a new virus could sneak in undetected by the obsolete
|
|
scanners and wreak havoc.
|
|
|
|
So, the person responsible for the network has imposed a requirement: no PC
|
|
that does not run the latest version of SuperDuper Scan is allowed to log in.
|
|
That's fine, but how do you achieve that? The simple answer is - by keeping
|
|
a copy of the (presumably resident) scanner on each of the PCs and regularly
|
|
updating them. Only problem is - how do you keep 1,000 PCs up-to-date? And
|
|
keeping them up-to-date with a product, a new version of which is released
|
|
every month? If you try to go to each PC (and they are probably in different
|
|
buildings and some are in obscure locations and used rarely) and update it
|
|
manually from a floppy - then one month will not be sufficient to update
|
|
them all - and before you have finished, you'll have to start all over again!
|
|
A real nightmare...
|
|
|
|
The obvious alternative is to keep one copy of the anti-virus package on the
|
|
server and update the PCs from there. (Of course, it is presumed that you
|
|
have a site license, but any company with 1,000 PCs that is using a
|
|
particular anti-virus product has also probably been careful enough to get
|
|
a site license.) However, if you go to each PC and manually download the new
|
|
version from the server, then the situation has not improved very much. One
|
|
option is to tell the users to do it regularly, and even set some sort of
|
|
automatic system that sends them automatic reminders each time the software
|
|
on the server is updated. However, users tend to be lazy and automatic
|
|
messages tend to be automatically ignored...
|
|
|
|
But there is an alternative! Design the anti-virus package like a network
|
|
virus (a worm actually). One segment of the worm constantly monitors the
|
|
logins. Each time a workstation attempts to login, that segment automatically
|
|
questions that station whether it is running the anti-virus product and which
|
|
version of it. If it turns out that a newer version is available, the segment
|
|
informs the user about this, and proposes to update the local version. If the
|
|
user refuses, then access to the network is denied. If the user accepts,
|
|
another segment of the worm fetches the relevant (updated) parts of the
|
|
package from the server, uploads them to the workstation, and reboots the
|
|
latter, in order to make sure that the changes will take effect. Of course,
|
|
the user is kept informed about this and user permission is requested each
|
|
time.
|
|
|
|
Now comes the best part. The "worm" - the set of programs that are
|
|
responsible for the automatic distribution of the software actually come as
|
|
part of it. They are part of the anti-virus software, and they are used to
|
|
copy parts of the anti-virus software accross the network, in an automated
|
|
way. That is, to some extent, the package is a virus (worm), because it is
|
|
able to replicate (parts of) itself.
|
|
|
|
Are there any ethical problems? I don't see any. The owner of the network has
|
|
the full right to decide what the policy of admitting workstations to log in
|
|
will be. The user has the alternative not to comply - and not to use the
|
|
network. Of course, in a well-implemented (read: secure) package, the
|
|
different parts of the virus will use cryptographic means to authentify each
|
|
other. That is, it will be impossible for the user to lie that "yeah, the
|
|
newest version of the software is already running", and it will be impossible
|
|
for a rogue program to lie "hi, I'm the automatic distribution service; lemme
|
|
"update" your anti-virus package". In most of the existing implementations
|
|
the packages do not go to such trouble, but in the future they probably will
|
|
- because this is the way to go. Of course, there will be some other goodies,
|
|
like making sure that the different "worms" of this kind do not conflict with
|
|
each other and so on, but this is not so important for this discussion.
|
|
|
|
In fact, it is extremely easy to implement a primitive version of what
|
|
I described above. A simple set of command lines inserted in the system login
|
|
script and a couple of external programs will do the job...
|
|
|
|
|
|
Editor's note:
|
|
--------------
|
|
|
|
This example of beneficial virus is taken from the Mr Bontchev's posting to
|
|
Virus-L/comp.virus which in its entirety appeared in Virus-L Digest Volume
|
|
7, Issue 48, 1 Jul 1994.
|
|
|
|
|
|
@^^^@***@^^^@***@^^^@***@^^^@***@^^^@***@^^^@***@^^^@***@^^^@***@^^^@***@^^^@
|
|
|
|
Has a dog Buddha-nature or not?
|
|
Mu!
|
|
- Zen koan -
|
|
|
|
@^^^@***@^^^@***@^^^@***@^^^@***@^^^@***@^^^@***@^^^@***@^^^@***@^^^@***@^^^@
|
|
|
|
|
|
THE GRAND DEBATE ABOUT BENEFICIAL VIRUSES AND ARTIFICIAL LIFE
|
|
=============================================================
|
|
|
|
In the previous articles, three more or less different viewpoints about
|
|
beneficial viruses and artificial life were presented. The topic is
|
|
undoubtedly interesting. Could computer viruses be beneficial? What is
|
|
artificial life? Are computer viruses the form of artificial life or not?
|
|
Is it ethical to play with such things?...etc...The questions are numerous.
|
|
The answers, opinions and approaches can vary widely - from the scientific
|
|
(and somewhat controversial) interests of Fred Cohen and Mark Ludwig,
|
|
pragmatic (and somewhat sceptical) approach of Vesselin Bontchev till vague
|
|
and possibly confused opinions of "average computer user" and spurious
|
|
intentions of anonymous virus writers today.
|
|
|
|
There is a lot of confusion in the computer virus/anti-virus society today.
|
|
Many things are not clear. For example, do we know what are we talking about
|
|
when talking about computer viruses and/or artificial life? Do we talk with
|
|
each other or it is a heap of monologues without anybody listening carefully?
|
|
Where are the limits between scientific research and criminal activity? What
|
|
is the science and what is marketing and media hype? Who can tell the
|
|
difference? Are there connections between research in artificial life and
|
|
hyper production of computer viruses (with possibly malicious purposes)
|
|
today?
|
|
|
|
I would like to put some order in the confusion. On the pages of "Alive"
|
|
everybody will have a right to give his or her opinion, regardless if he or
|
|
she is an anti-virus expert/producer/researcher or "average user" (whatever
|
|
it means) or virus writer. I would like to invite all to Grand Debate about
|
|
Beneficial Viruses and Artificial Life to present your opinions and eventual
|
|
work in computer virus and/or artificial life field. However, I prefer a
|
|
little calmer atmosphere than it is on some public forums, at least the
|
|
discussions without pointless personal attacks. In fact, it is the only rule
|
|
for the Grand Debate. Everything else is free. By this I announce officially
|
|
that Grand Debate about Beneficial Viruses and Artificial Life is opened.
|
|
|
|
The purpose of the Grand Debate is to give some answers, if possible. The
|
|
subject is complex and there is no unique answer. For example, Fred Cohen
|
|
said: "...viruses are only part of a pair - the life form and its
|
|
environment..." According to Mark Ludwig viruses are "...a real-life
|
|
phenomenon, rather than a laboratory construct..." and perhaps "...the only
|
|
'life-form' apart from earth carbon-based life we will ever meet..." Vesselin
|
|
Bontchev thinks that viruses are "...challenging, doing something which is
|
|
unusual and clever...", but he doesn't believe that "...computer viruses are
|
|
a form of artificial life..."
|
|
|
|
Talking about beneficial viruses Fred Cohen stated: "A benevolent virus is
|
|
simply a virus that is used for good purposes, but then this is a matter of
|
|
context...Good and bad are relative. Most of the viruses I discuss as
|
|
benevolent are in fact reproducing symbol sequences without any known
|
|
malicious effect..." Mark Ludwig thinks: "There's a certain amount of inertia
|
|
you have to overcome to get people to actually install a beneficial virus,
|
|
though, because they've been brainwashed into believing that virus = bad..."
|
|
Vesselin Bontchev says that "...what most people understand under the term
|
|
of 'computer virus' cannot be beneficial..." and that "...'real' computer
|
|
viruses are always bad..." Furthermore, he gives the definition of "real
|
|
virus" and average user's understanding of the term. At this point it seems
|
|
that the problem of good definition of computer virus is the most important
|
|
problem to solve.
|
|
|
|
What is artificial life? According to Fred Cohen there is no difference from
|
|
real life and "the word artificial is really only a side effect of people's
|
|
egos requiring a special name for things they create..." He is talking
|
|
"...about foundations for the understanding of life in the general sense, an
|
|
expansion of biology into the general informational domain, drawing parallels
|
|
between our biosphere and the infosphere, understanding the implications of
|
|
the changes in our environment through information systems before we
|
|
experiment on our children..."
|
|
|
|
Mark Ludwig said that "...staring hard at viruses might be very valuable in
|
|
bringing about a revolution in evolutionary biology. Using carbon-based
|
|
organisms is a horrible way to study evolution. They are too complex and we
|
|
don't understand them well enough. The time frames of evolution are too
|
|
large. And deep philosophical questions rear their heads all over the place.
|
|
Inside the computer, most of these difficulties just vanish..."
|
|
|
|
Although not talking about artificial life Vesselin Bontchev gives very good
|
|
points to think about in his "Dozen reasons..." When experimenting with
|
|
potentially dangerous things which have ability to reproduce and to modify
|
|
themselves the question of controllability of such "creatures" is very
|
|
important. "A virus that claims to be beneficial should provide means to be
|
|
controlled..." and "...the user of the beneficial virus should actively
|
|
invite (e.g. install) the virus on his/her system..."
|
|
|
|
The brief conclusions from these introductory discussions are:
|
|
|
|
a) a good definition of computer virus is needed
|
|
b) beneficial viruses are possible, but it is hard to change the negative
|
|
meaning which term "computer virus" already got in public
|
|
c) the research in computer viruses and artificial life can bring us to
|
|
better understanding of life in general
|
|
d) it is important to know how to control experiments and practical use of
|
|
self reproducing entities (with eventual possibility of modification of
|
|
themselves and their environment).
|
|
|
|
It seems that this is quite a lot for the beginning. I expect that in further
|
|
discussions more questions and problems will arise, before some answers
|
|
appear. After all it is all real life. Maybe, the computer viruses are in the
|
|
world to teach us something. Computer viruses are not only pointing to
|
|
vulnerabilities in today's information systems, but also in vulnerabilities
|
|
in human society. In the smaller extent everything can be seen here. I am not
|
|
sure that there is an exact answer to question why people want to hurt other
|
|
people or to destroy something. The destruction due to malicious computer
|
|
viruses is not really the same as destruction in war. The writers of
|
|
malicious computer viruses are not the killers. Anyway, they want to tell us
|
|
something. What is that we have to find out by ourselves. Maybe we will also
|
|
find the way to learn how to put the human dimension in our everyday life.
|
|
|
|
|
|
++++oooo++++oooo++++oooo++++oooo++++oooo++++oooo++++oooo++++oooo++++oooo++++
|
|
|
|
God made us plain and simple,
|
|
but we have made ourselves
|
|
very complicated.
|
|
|
|
- Ecclesiastes 7.29 -
|
|
|
|
++++oooo++++oooo++++oooo++++oooo++++oooo++++oooo++++oooo++++oooo++++oooo++++
|
|
|
|
|
|
____________________________________________________
|
|
/ / | |
|
|
/ |\__/| / | THAT'S ALL FOLKS !! |
|
|
/~~~~~~\ / \ | NEW "ALIVE" IS COMING NEXT |
|
|
~\( * * )/~~\( 0 0 )/~ | HOST TO YOU SOON !! |
|
|
( O ) ( O ) |______________________________|
|
|
\______/ \______/
|
|
@/ \@ @/ \@
|
|
|