References 1. Peter Szor , "The New 32-bit Medusa," Virus Bulletin, December 2000, pp. 8-10.2. Frans Veldman , "Why Do We Need Heuristics?" Virus Bulletin Conference, 1995, pp. XI-XV.3. Frans Veldman , "Combating Viruses Heuristically," Virus Bulletin Conference, September 1993, Amsterdam.4. Rajeev Nagar , "Windows NT: File System Internals," O'Reilly, Sebastopol 1997, ISBN: 1-56592-249-2 (Paperback).5. R. S. Boyer and J. S. Moore , "A Fast String Searching Algorithm," CACM, October 1997, pp. 762-772.6. Carey Nachenberg , personal communication, 1999.7. Roger Riordan , "Polysearch: An Extremely Fast Parallel Search Algorithm," Computer Virus and Security Conference, 1992, pp. 631-640.8. Dr. Peter Lammer , "Cryptographic Checksums," Virus Bulletin, October 1990.9. Fridrik Skulason and Dr. Vesselin Bontchev , personal communication, 1996.10. Dr. Ferenc Leitold and Janos Csotai , "Virus Killing and Searching Language," Virus Bulletin Conference, 1994.11. Frans Veldman , " Generic Decryptors: Emulators of the future," http://users.knoware.nl/users/veldman/frans/english/gde.12. Frederic Perriot , "Ship of the Desert," Virus Bulletin, June 2004, pp. 6-8.13. Peter Ferrie and Peter Szor , "Zmist Opportunities," Virus Bulletin, March 2001, pp. 6-7.14. Frederic Perriot and Peter Ferrie , "Principles and Practice of X-raying," Virus Bulletin Conference, 2004, pp. 51-65.15. Eugene Kaspersky , personal communication, 1997.16. Carey Nachenberg , "Staying Ahead of the Virus Writers: An In-Depth Look at Heuristics," Virus Bulletin Conference, 1998, pp. 85-98.17. Dr. Igor Muttik , personal communication, 2001.18. Frederic Perriot , "Defeating Polymorphism Through Code Optimization," Virus Bulletin Conference, 2003.19. Peter Szor and Peter Ferrie , "Hunting for Metamorphic," Virus Bulletin Conference, 2001, pp. 123-144.20. Andrian Marinescu , "ACG in the Hole," Virus Bulletin, July 1999, pp. 8-9.21. Dmitry O. Gryaznov , "Scanners of the Year 2000: Heuristics," Virus Bulletin Conference, 1995, pp. 225-234.22. Kurt Natvig , "Sandbox II: Internet," Virus Bulletin Conference, 2002, pp. 125-141.23. Peter Ferrie , "Magisterium Abraxas," Virus Bulletin, May 2001, pp. 6-7.24. Gabor Szappanos , "VBA Emulator Engine Design," Virus Bulletin Conference, 2001, pp. 373-388.25. Peter Szor , "Attacks on Win32," Virus Bulletin Conference, 1998.26. Glenn Coates and David Leigh , "Virus Detection: The Brainy Way," Virus Bulletin Conference, 1995, pp. 211-224.27. Righard Zwienenberg , "Heuristics Scanners: Artificial Intelligence?," Virus Bulletin Conference, 1995, pp. 203-210.28. Costin Raiu , "Defeating the 7-headed monster," http://craiu.pcnet.ro/papers.29. Gerald Tesauro, Jeffrey O. Kephart, Gregory B. Sorkin , "Neural Networks for Computer Virus Recognition," IEEE Expert, Vol. 11, No. 4, August 1996, pp. 5-6.30. William Arnold and Gerald Tesauro , "Automatically Generated Win32 Heuristic Virus Detection," Virus Bulletin Conference, September 2000, pp. 123-132.31. John Von Neumann , The Computer and the Brain, Yale University, 2000, 1958, ISBN: 0-300-08473-0 (Paperback).32. Peter Szor , "Generic Disinfection," Virus Bulletin Conference, 1996.33. Frans Veldman , Documentation of TBCLEAN.34. Dr. Alan Solomon , personal communication, 1996.35. Dr. Alan Solomon , "PC Viruses: Detection, Analysis and Cure," Springer Verlag, 1991.36. Carey Nachenberg and Alex Haddox , "Generic Decryption Scanners: The Problems," Virus Bulletin, August 1996, pp. 6-8.37. Dr. Frederick B. Cohen , A Short Course on Computer Viruses, Wiley, 2nd Edition, 1994, ISBN: 0471007684.38. Ronald L. Rivest , "The MD5 Message-Digest Algorithm," RFC 1321, April 1992.39. Yisrael Radai , "Checksumming Techniques for Anti-Viral Purposes," Virus Bulletin Conference, 1991, pp. 39-68.40. Dr. Frederick Cohen , "A Note on High-Integrity PC Bootstrapping," Computers & Security, 10, 1991, pp. 535-539.41. Mikko Hypponen , "Putting Macros Under Control," Virus Bulletin, 1998, pp. 289-300.42. Vesselin Bontchev , "Possible Virus Attacks Against Integrity Programs and How to Prevent Them," Virus Bulletin Conference, 1992, pp. 131-141.43. Dr. Frederick Cohen , "Models of Practical Defenses Against Computer Viruses," Computers & Security, 8, 1989, pp. 149-160.44. Dr. Vesselin Bontchev , personal communication, 2004.45. Morton Swimmer , "Virus Intrusion Detection Expert System," EICAR, 1995.46. Costin Raiu , "Suspicious Behaviour: Heuristic Detection of Win32 Backdoors," Virus Bulletin Conference, 1999, pp. 109-124. |