THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] - نسخه متنی

Peter Szor

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











  • References


    1. Bruce McCorkendale and Peter Szor ,
    "CodeRed Buffer Overflow," Virus Bulletin, September 2001, http://www.peterszor.com/codered.pdf.

    2. Frederic Perriot and Peter Szor ,
    "An Analysis of the Slapper Worm Exploit," http://securityresponse.symantec.com/avcenter/reference/analysis.slapper.worm.pdf.

    3. Frederic Perriot and Peter Szor ,
    "Slamdunk: An Analysis of Slammer Worm," Virus Bulletin, March 2003, http://www.peterszor.com/slammer.pdf.

    4. David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, Nicholas Weaver ,
    "The Spread of the Sapphire/Slammer Worm," http://www.cs.berkeley.edu/~nweaver/sapphire/.

    5. Mark Kennedy ,
    "Script-Based Mobile Threats," Virus Bulletin, 2000,
    pp. 335355.

    6. Peter Ferrie ,
    "Sobig, Sobigger, Sobiggest," Virus Bulletin, October 2003,
    pp. 5-10.

    7. Eugene Spafford ,
    "The Internet Worm Program: An Analysis," 1988, http://www.cerias.purdue.edu/homes/spaf/tech-reps/823.pdf.

    8. Peat Bakke, Steve Beattie, Crispan Cowan, Aaron Grier, Heather Hinton, Dave Maier, Oregon Graduate Institute of Science & Technology, Calton Pu , Ryerson Polytechnic University, Perry Wagle, Jonathan Walpole, and Qian Zhang ,
    "StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks," 7th USENIX Security Symposium, http://www.usenix.org/publications/library/proceedings/sec98/cowa178.

    9. Elias Levy ,
    "Smashing the Stack for Fun and Profit," Phrack 49.

    10. Eric Chien and Peter Szor ,
    "Blended Attacks," Virus Bulletin, 2002, http://securityresponse.symantec.com/avcenter/reference/blended.pdf.

    11. Michael Howard and David LeBlanc ,
    "Writing Secure Code," Microsoft Press, 2003.

    12. Hiroaki Etoh ,
    "ProPolice," http://www.trl.ibm.com/projects/security/ssp.

    13. Matt Conover and the w00w00 Security Team,
    "w00w00 on Heap Overflows," http://www.w00w00.org//image/library/english/13905_articles/heaptut.txt.

    14. Libsafe, http://www.research.avayalabs.com/project/libsafe.

    15. PaX Team, http://pageexec.virtualave.net.

    16. SecureStack, http://www.securewave.com.

    17. Vladimir Kiriansky, Derek Bruening, and Saman Amarasinghe ,
    "Secure Execution via Program Shepherding," 11th USENIX Security Symposium, August 2002.

    18. Derek Bruening, Evelyn Duesterwald, and Saman Amarasinghe ,
    "Design and Implementation of a Dynamic Optimization Framework for Windows," 4th ACM Workshop on Feedback-Directed and Dynamic Optimization (FDDO-4), 2001.

    19. David Litchfield ,
    "Unauthenticated Remote Compromise in MS SQL Server 2000," http://www.nextgenss.com/advisories/mssql-udp.txt.

    20. Hobbit ,
    "Netcat," http://www.atstake.com/research/tools/network_utilities.

    21. Frederic Perriot, Peter Ferrie, and Peter Szor ,
    "Blast Off!," Virus Bulletin, September 2003, http://www.peterszor.com/blaster.pdf.

    22. Peter Ferrie, Frederic Perriot, and Peter Szor ,
    "Chiba Witty Blues," Virus Bulletin, May 2004,
    pp. 9-10.

    23. Matthew Williamson ,
    "Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code," http://www.hpl.hp.com/techreports/2002/HPL-2002-172R1.pdf.

    24. Mikko Hyppönen ,
    "RetrovirusesHow Viruses Fight Back," Virus Bulletin, 1994, http://www.hypponen.com/staff/hermanni/more/papers/retro.

    25. Vern Paxson, Stuart Staniford, and Nicholas Weaver ,
    "How to 0wn the Internet in Your Spare Time," http://www.icir.org/vern/papers/cdc-usenix-sec02.

    26. Dr. Frederick B. Cohen , A Short Course on Computer Viruses, Wiley Professonal Computing, 2nd Edition, New York, 1994, ISBN: 0471007684.

    27.
    "Executable Disable Bit Functionality Blocks Malware Code Execution," http://cache-www.intel.com/cd/00/00/14/93/149307_149307.pdf.

    28. Ivan Arce ,
    "The Shellcode Generation," IEEE, Security & Privacy, September/October 2004, Volume 2, Number 5,
    pp. 7276.


    • / 191