References 1. Dr. Vesselin Bontchev , "Methodology of Computer Anti-Virus Research," University of Hamburg, Dissertation, 1998.2. Dr. Harold Highland , "A Macro Virus," Computers & Security, August 1989, pp. 178-188.3. Joe Wells , "Brief History of Computer Viruses," 1996, http://www.research.ibm.com/antivirus/timeline.4. Dr. Peter Lammer , "Jonah's Journey," Virus Bulletin, November 1990, p. 20.5. Peter Ferrie , personal communication, 2004.6. Jim Bates , "WHALE...A Dinosaur Heading For Extinction," Virus Bulletin, November 1990, pp. 17-19.7. Eric Chien , "Malicious Threats to Personal Digital Assistants," Symantec, 2000.8. Dr. Alan Solomon , "A Brief History of Viruses," EICAR, 1994, pp. 117-129.9. Intel Pentium Processor III Specification Update, http://www.intel.com/design/PentiumIII/specupdt/24445349.pdf.10. Mikko Hypponen , Private Communication, 1996.11. Thomas Lipp , "Computerviren," 64'er, Markt&Technik, March 1989.12. Peter Szor , "Stream of Consciousness," Virus Bulletin, October 2000, p. 6.13. Peter Szor and Peter Ferrie , "64-bit Rugrats," Virus Bulletin, July 2004, pp. 4-6.14. Marious Van Oers , "Linux VirusesELF File Format," Virus Bulletin Conference, 2000, pp. 381-400.15. Jakub Kaminski , "Not So Quiet on the Linux Front: Linux Malware II," Virus Bulletin Conference, 2001, pp. 147-172.16. Eugene Kaspersky , "Shifter.983," http://www.viruslist.com, 1993.17. Sarah Gordon , "What a (Winword.) Concept," Virus Bulletin, September 1995, pp. 8-9.18. Sarah Gordon , "Excel Yourself!" Virus Bulletin, August 1996, pp. 9-10.19. Yoshihiro Yasuda , personal communication, 2004.20. Dr. Igor Muttik , "Macro VirusesPart 1," Virus Bulletin, September 1999, pp. 13-14.21. Dr. Vesselin Bontchev , "The Pros and Cons of WordBasic Virus Up-conversion," Virus Bulletin Conference, 1998, pp. 153-172.22. Dr. Vesselin Bontchev , "Possible Macro Virus Attacks and How to Prevent Them," Virus Bulletin Conference, 1996, pp. 97-127.23. Dr. Vesselin Bontchev , "Solving the VBA Up-conversion Problem," Virus Bulletin Conference, 2001, pp. 273-300.24. Nick FitzGerald , "If the CAP Fits," Virus Bulletin, September 1999, pp. 6-7.25. Jimmy Kuo , "Free Anti-Virus Tips and Techniques: Common Sense to Protect Yourself from Macro Viruses," NAI White Paper, 2000.26. Dr. Vesselin Bontchev , personal communication, 2004.27. Jakub Kaminski , "Disappearing MacrosNatural Devolution of Up-converted Macro Viruses," Virus Bulletin Conference, 1998, pp. 139-151.28. Katrin Tocheva , "Multiple Infections," Virus Bulletin, 1999, pp. 301-314.29. Dr. Richard Ford , "Richard's Problem," private communication on VMACRO mailing list, 1997.30. Dr. Vesselin Bontchev , "Macro Virus Identification Problems," Virus Bulletin Conference, 1997, pp. 157-196.31. Dr. Vesselin Bontchev , private communication, 1998.32. Vesselin Bontchev , "No Peace on the Excel Front," Virus Bulletin, April 1998, pp. 16-17.33. Gabor Szappanos , "XML Heaven," Virus Bulletin, February 2003, pp. 8-9.34. Peter G. Capek, David M. Chess, Alan Fedeli, and Dr. Steve R. White , "Merry Christmas: An Early Network Worm," IEEE Security & Privacy, http://www.computer.org/security/v1n5/j5cap.35. Dr. Klaus Brunnstein , "Computer 'Beastware': Trojan Horses, Viruses, WormsA Survey," HISEC'93, 1993.36. David Ferbrache , "A Pathology of Computer Viruses," Springer-Verlag, 1992, ISBN: 3-540-19610-2.37. Peter Szor , "Warped Logic?" Virus Bulletin, June 2001, pp. 5-6.38. Mikhail Pavlyushchik , "Virus Mapping," Virus Bulletin, November 2003, pp. 4-5.39. Eugene Kaspersky , "Don't Press F1," Virus Bulletin, January 2000, pp. 7-8.40. Peter Szor , "Sharpei Behaviour," Virus Bulletin, April 2002, pp. 4-5.41. Gabor Kiss , "SWF/LFM-926Flash in the Pan?" Virus Bulletin, February 2002, p. 6.42. Dmitry Gryaznov , private communication, 2004.43. Sami Rautiainen , private communication, 2004.44. Philip Hannay and Richard Wang , "MSIL for the .NET Framework: The Next Battleground?," Virus Bulletin Conference, 2001, pp. 173-196.45. Peter Szor , "Tasting Donut," Virus Bulletin, March 2002, pp. 6-8.46. Peter Ferrie , "The Beagle Has Landed," http://www.virusbtn.com/resources/viruses/indepth/beagle.xml.47. Eugene Kaspersky , "Zhengxi: Saucerful of Secrets," Virus Bulletin, April 1996, pp. 8-10.48. Roger A. Grimes , Malicious Mobile Code, O'Reilly, 2001, ISBN: 1-56592-682-X (Paperback).49. Ken Thomson , "Reflections on Trusting Trust," Communication of the ACM, Vol. 27, No. 8, August 1984, pp. 761-763, http://cm.bell-labs.com/who/ken/trus184.50. Peter Szor , "Pocket Monsters," Virus Bulletin, August 2001, pp. 8-9.51. Igor Daniloff , "Anarchy in the USSR," Virus Bulletin, October 1997, pp. 6-8.52. Lakub Kaminski , "Hidden Partitions vs. Multipartite VirusesI'll be back!," Virus Bulletin Conference, 1996.53. Peter Szor , "Junkie Memorial," Virus Bulletin, September 1997, pp. 6-8.54. Dr. Igor Muttik , "3apa3a," http://www.f-secure.com/v-descs/3apa3a.shtml, 1994.55. "Buffer Overrun in JPEG Processing (GDI+) Could Allow Code Execution," MS04-028,  |