THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] - نسخه متنی

Peter Szor

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











  • References


    1. Peter Szor ,
    "The New 32-bit Medusa," Virus Bulletin, December 2000,
    pp. 8-10.

    2. Frans Veldman ,
    "Why Do We Need Heuristics?" Virus Bulletin Conference, 1995,
    pp. XI-XV.

    3. Frans Veldman ,
    "Combating Viruses Heuristically," Virus Bulletin Conference, September 1993, Amsterdam.

    4. Rajeev Nagar ,
    "Windows NT: File System Internals," O'Reilly, Sebastopol 1997, ISBN: 1-56592-249-2 (Paperback).

    5. R. S. Boyer and J. S. Moore ,
    "A Fast String Searching Algorithm," CACM, October 1997,
    pp. 762-772.

    6. Carey Nachenberg , personal communication, 1999.

    7. Roger Riordan ,
    "Polysearch: An Extremely Fast Parallel Search Algorithm," Computer Virus and Security Conference, 1992,
    pp. 631-640.

    8. Dr. Peter Lammer ,
    "Cryptographic Checksums," Virus Bulletin, October 1990.

    9. Fridrik Skulason and Dr. Vesselin Bontchev , personal communication, 1996.

    10. Dr. Ferenc Leitold and Janos Csotai ,
    "Virus Killing and Searching Language," Virus Bulletin Conference, 1994.

    11. Frans Veldman ,
    " Generic Decryptors: Emulators of the future," http://users.knoware.nl/users/veldman/frans/english/gde.

    12. Frederic Perriot ,
    "Ship of the Desert," Virus Bulletin, June 2004,
    pp. 6-8.

    13. Peter Ferrie and Peter Szor ,
    "Zmist Opportunities," Virus Bulletin, March 2001,
    pp. 6-7.

    14. Frederic Perriot and Peter Ferrie ,
    "Principles and Practice of X-raying," Virus Bulletin Conference, 2004,
    pp. 51-65.

    15. Eugene Kaspersky , personal communication, 1997.

    16. Carey Nachenberg ,
    "Staying Ahead of the Virus Writers: An In-Depth Look at Heuristics," Virus Bulletin Conference, 1998,
    pp. 85-98.

    17. Dr. Igor Muttik , personal communication, 2001.

    18. Frederic Perriot ,
    "Defeating Polymorphism Through Code Optimization," Virus Bulletin Conference, 2003.

    19. Peter Szor and Peter Ferrie ,
    "Hunting for Metamorphic," Virus Bulletin Conference, 2001,
    pp. 123-144.

    20. Andrian Marinescu ,
    "ACG in the Hole," Virus Bulletin, July 1999,
    pp. 8-9.

    21. Dmitry O. Gryaznov ,
    "Scanners of the Year 2000: Heuristics," Virus Bulletin Conference, 1995,
    pp. 225-234.

    22. Kurt Natvig ,
    "Sandbox II: Internet," Virus Bulletin Conference, 2002,
    pp. 125-141.

    23. Peter Ferrie ,
    "Magisterium Abraxas," Virus Bulletin, May 2001,
    pp. 6-7.

    24. Gabor Szappanos ,
    "VBA Emulator Engine Design," Virus Bulletin Conference, 2001,
    pp. 373-388.

    25. Peter Szor ,
    "Attacks on Win32," Virus Bulletin Conference, 1998.

    26. Glenn Coates and David Leigh ,
    "Virus Detection: The Brainy Way," Virus Bulletin Conference, 1995,
    pp. 211-224.

    27. Righard Zwienenberg ,
    "Heuristics Scanners: Artificial Intelligence?," Virus Bulletin Conference, 1995,
    pp. 203-210.

    28. Costin Raiu ,
    "Defeating the 7-headed monster," http://craiu.pcnet.ro/papers.

    29. Gerald Tesauro, Jeffrey O. Kephart, Gregory B. Sorkin ,
    "Neural Networks for Computer Virus Recognition," IEEE Expert, Vol. 11, No. 4, August 1996,
    pp. 5-6.

    30. William Arnold and Gerald Tesauro ,
    "Automatically Generated Win32 Heuristic Virus Detection," Virus Bulletin Conference, September 2000,
    pp. 123-132.

    31. John Von Neumann , The Computer and the Brain, Yale University, 2000, 1958, ISBN: 0-300-08473-0 (Paperback).

    32. Peter Szor ,
    "Generic Disinfection," Virus Bulletin Conference, 1996.

    33. Frans Veldman , Documentation of TBCLEAN.

    34. Dr. Alan Solomon , personal communication, 1996.

    35. Dr. Alan Solomon ,
    "PC Viruses: Detection, Analysis and Cure," Springer Verlag, 1991.

    36. Carey Nachenberg and Alex Haddox ,
    "Generic Decryption Scanners: The Problems," Virus Bulletin, August 1996,
    pp. 6-8.

    37. Dr. Frederick B. Cohen , A Short Course on Computer Viruses, Wiley, 2nd Edition, 1994, ISBN: 0471007684.

    38. Ronald L. Rivest ,
    "The MD5 Message-Digest Algorithm," RFC 1321, April 1992.

    39. Yisrael Radai ,
    "Checksumming Techniques for Anti-Viral Purposes," Virus Bulletin Conference, 1991,
    pp. 39-68.

    40. Dr. Frederick Cohen ,
    "A Note on High-Integrity PC Bootstrapping," Computers & Security, 10, 1991,
    pp. 535-539.

    41. Mikko Hypponen ,
    "Putting Macros Under Control," Virus Bulletin, 1998,
    pp. 289-300.

    42. Vesselin Bontchev ,
    "Possible Virus Attacks Against Integrity Programs and How to Prevent Them," Virus Bulletin Conference, 1992,
    pp. 131-141.

    43. Dr. Frederick Cohen ,
    "Models of Practical Defenses Against Computer Viruses," Computers & Security, 8, 1989,
    pp. 149-160.

    44. Dr. Vesselin Bontchev , personal communication, 2004.

    45. Morton Swimmer ,
    "Virus Intrusion Detection Expert System," EICAR, 1995.

    46. Costin Raiu ,
    "Suspicious Behaviour: Heuristic Detection of Win32 Backdoors," Virus Bulletin Conference, 1999,
    pp. 109-124.


    • / 191