THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] - نسخه متنی

Peter Szor

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











  • References


    1. http://www.cve.mitre.org(Common Vulnerabilities and Exposures).

    2. Elias Levy ,
    "Smashing the Stack for Fun and Profit," Phrack Magazine, 1996,Volume 7, Issue 49.

    3. Eric Chien ,
    "CodeRed Worm," July 2001, http://securityresponse.symantec.com/avcenter/venc/data/codered.wor177.

    4. Peter Szor ,
    "CodeRed II," August 2001, http://securityresponse.symantec.com/avcenter/venc/data/codered.i173.

    5. Eric Chien ,
    "W32.Nimda.A@mm," September 2001, http://securityresponse.symantec.com/avcenter/venc/data/w32.nimda.a@m177.

    6. Peter Szor and Peter Ferrie ,
    "Bad Transfer," Virus Bulletin, February 2002,
    pp. 5-7.

    7. Eric Chien and Peter Szor ,
    "Blended Attacks," Virus Bulletin Conference, 2002.

    8. Eugene H. Spafford ,
    "The Internet Worm Program: An Analysis," Purdue Technical Report, CSD-TR-823, 1988.

    9. Michael Howard and David LeBlanc ,
    "Writing Secure Code," Microsoft Press, 2003.

    10. David Litchfield ,
    "Windows 2000 Format String Vulnerabilities," May 8, 2002, www.nextgenss.com/papers/win32format.doc.

    11. Halvar Flake ,
    "Third Generation Exploits on NT/Win2K Platforms," BlackHat Conference, 2002, http://blackhat.co177/win-usa-02/win-usa-02-spkr183.

    12. Halvar Flake , personal communication, 2004.

    13. http://msdn.microsoft.com/workshop/components/activex/safety.asp.

    14. http://msdn.microsoft.com/library/en-us/script56/html/letcreatetypelib.asp.

    15. Peter Szor ,
    "Bolzano Bugs NT," Virus Bulletin, September 1999.

    16. Peter Szor ,
    "NetWare Execute-Only Attribute Considered Harmful," EICAR Conference, 1996,
    pp. 167-172.

    17. Andrew Schulman, Ralf Brown, David Maxey, Raymond J. Michels, and Jim Kyle , Undocumented DOS, 2nd Edition, 1994, Addison-Wesley Publishing Company, Reading.

    18. Peter Szor ,
    "W32.Funlove.4099," November 1999, http://securityresponse.symantec.com/avcenter/venc/data/w32.funlove.4099l.

    19. Frederic Perriot ,
    "W32/Opaserv," Virus Bulletin, December 2002, http://www.virusbtn.com/resources/viruses/indepth/opaserv.xml.

    20. Bruce McCorkendale and Peter Szor ,
    " Code Red Buffer Overflow," Virus Bulletin September 2001.

    21. Jack Koziol, David Litchfield, Dave Aitel, Chris Anley, Sinan Eren, Neel Mehta, and Riley Hassel ,
    "The Shellcoder's Handbook," Wiley Publishing, Inc., Indianapolis, May 2004, ISBN: 07645-4468-3 (Paperback).

    22. Frederic Perriot and Peter Szor ,
    "Let free(dom) Ring!," Virus Bulletin, November 2002,
    pp. 8-10.

    23. Peter Szor and Frederic Perriot ,
    "Slam dunk," Virus Bulletin, March 2003,
    pp. 6-7.

    24. David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, and Nicholas Weafer ,
    "Spread of the Sapphire/Slammer Worm," http://www.cs.berkeley.edu/~nweaver/sapphire.

    25. Frederic Perriot, Peter Ferrie, and Peter Szor ,
    "Worm Wars," Virus Bulletin, October 2003,
    pp. 5-8.

    26. Frederic Perriot, Peter FerrieandPeter Szor,
    "Blast Off!" Virus Bulletin, September 2003,
    pp. 10-11.

    27. Sarah Gordon ,
    "The worm has turned," Virus Bulletin, August 1998.

    28. Vanja Svajcer ,
    "Kak-astrophic," Virus Bulletin, March 2000,
    page 7.


    • / 191