THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] - نسخه متنی

Peter Szor

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











  • References


    1. Dr. Vesselin Bontchev ,
    "Methodology of Computer Anti-Virus Research," University of Hamburg, Dissertation, 1998.

    2. Dr. Harold Highland ,
    "A Macro Virus," Computers & Security, August 1989,
    pp. 178-188.

    3. Joe Wells ,
    "Brief History of Computer Viruses," 1996, http://www.research.ibm.com/antivirus/timeline.

    4. Dr. Peter Lammer ,
    "Jonah's Journey," Virus Bulletin, November 1990,
    p. 20.

    5. Peter Ferrie , personal communication, 2004.

    6. Jim Bates ,
    "WHALE...A Dinosaur Heading For Extinction," Virus Bulletin, November 1990,
    pp. 17-19.

    7. Eric Chien ,
    "Malicious Threats to Personal Digital Assistants," Symantec, 2000.

    8. Dr. Alan Solomon ,
    "A Brief History of Viruses," EICAR, 1994,
    pp. 117-129.

    9. Intel Pentium Processor III Specification Update, http://www.intel.com/design/PentiumIII/specupdt/24445349.pdf.

    10. Mikko Hypponen , Private Communication, 1996.

    11. Thomas Lipp ,
    "Computerviren," 64'er, Markt&Technik, March 1989.

    12. Peter Szor ,
    "Stream of Consciousness," Virus Bulletin, October 2000,
    p. 6.

    13. Peter Szor and Peter Ferrie ,
    "64-bit Rugrats," Virus Bulletin, July 2004,
    pp. 4-6.

    14. Marious Van Oers ,
    "Linux VirusesELF File Format," Virus Bulletin Conference, 2000,
    pp. 381-400.

    15. Jakub Kaminski ,
    "Not So Quiet on the Linux Front: Linux Malware II," Virus Bulletin Conference, 2001,
    pp. 147-172.

    16. Eugene Kaspersky ,
    "Shifter.983," http://www.viruslist.com, 1993.

    17. Sarah Gordon ,
    "What a (Winword.) Concept," Virus Bulletin, September 1995,
    pp. 8-9.

    18. Sarah Gordon ,
    "Excel Yourself!" Virus Bulletin, August 1996,
    pp. 9-10.

    19. Yoshihiro Yasuda , personal communication, 2004.

    20. Dr. Igor Muttik ,
    "Macro VirusesPart 1," Virus Bulletin, September 1999,
    pp. 13-14.

    21. Dr. Vesselin Bontchev ,
    "The Pros and Cons of WordBasic Virus Up-conversion," Virus Bulletin Conference, 1998,
    pp. 153-172.

    22. Dr. Vesselin Bontchev ,
    "Possible Macro Virus Attacks and How to Prevent Them," Virus Bulletin Conference, 1996,
    pp. 97-127.

    23. Dr. Vesselin Bontchev ,
    "Solving the VBA Up-conversion Problem," Virus Bulletin Conference, 2001,
    pp. 273-300.

    24. Nick FitzGerald ,
    "If the CAP Fits," Virus Bulletin, September 1999,
    pp. 6-7.

    25. Jimmy Kuo ,
    "Free Anti-Virus Tips and Techniques: Common Sense to Protect Yourself from Macro Viruses," NAI White Paper, 2000.

    26. Dr. Vesselin Bontchev , personal communication, 2004.

    27. Jakub Kaminski ,
    "Disappearing MacrosNatural Devolution of Up-converted Macro Viruses," Virus Bulletin Conference, 1998,
    pp. 139-151.

    28. Katrin Tocheva ,
    "Multiple Infections," Virus Bulletin, 1999,
    pp. 301-314.

    29. Dr. Richard Ford ,
    "Richard's Problem," private communication on VMACRO mailing list, 1997.

    30. Dr. Vesselin Bontchev ,
    "Macro Virus Identification Problems," Virus Bulletin Conference, 1997,
    pp. 157-196.

    31. Dr. Vesselin Bontchev , private communication, 1998.

    32. Vesselin Bontchev ,
    "No Peace on the Excel Front," Virus Bulletin, April 1998,
    pp. 16-17.

    33. Gabor Szappanos ,
    "XML Heaven," Virus Bulletin, February 2003,
    pp. 8-9.

    34. Peter G. Capek, David M. Chess, Alan Fedeli, and Dr. Steve R. White ,
    "Merry Christmas: An Early Network Worm," IEEE Security & Privacy, http://www.computer.org/security/v1n5/j5cap.

    35. Dr. Klaus Brunnstein ,
    "Computer 'Beastware': Trojan Horses, Viruses, WormsA Survey," HISEC'93, 1993.

    36. David Ferbrache ,
    "A Pathology of Computer Viruses," Springer-Verlag, 1992, ISBN: 3-540-19610-2.

    37. Peter Szor ,
    "Warped Logic?" Virus Bulletin, June 2001,
    pp. 5-6.

    38. Mikhail Pavlyushchik ,
    "Virus Mapping," Virus Bulletin, November 2003,
    pp. 4-5.

    39. Eugene Kaspersky ,
    "Don't Press F1," Virus Bulletin, January 2000,
    pp. 7-8.

    40. Peter Szor ,
    "Sharpei Behaviour," Virus Bulletin, April 2002,
    pp. 4-5.

    41. Gabor Kiss ,
    "SWF/LFM-926Flash in the Pan?" Virus Bulletin, February 2002,
    p. 6.

    42. Dmitry Gryaznov , private communication, 2004.

    43. Sami Rautiainen , private communication, 2004.

    44. Philip Hannay and Richard Wang ,
    "MSIL for the .NET Framework: The Next Battleground?," Virus Bulletin Conference, 2001,
    pp. 173-196.

    45. Peter Szor ,
    "Tasting Donut," Virus Bulletin, March 2002,
    pp. 6-8.

    46. Peter Ferrie ,
    "The Beagle Has Landed," http://www.virusbtn.com/resources/viruses/indepth/beagle.xml.

    47. Eugene Kaspersky ,
    "Zhengxi: Saucerful of Secrets," Virus Bulletin, April 1996,
    pp. 8-10.

    48. Roger A. Grimes , Malicious Mobile Code, O'Reilly, 2001, ISBN: 1-56592-682-X (Paperback).

    49. Ken Thomson ,
    "Reflections on Trusting Trust," Communication of the ACM, Vol. 27, No. 8, August 1984,
    pp. 761-763, http://cm.bell-labs.com/who/ken/trus184.

    50. Peter Szor ,
    "Pocket Monsters," Virus Bulletin, August 2001,
    pp. 8-9.

    51. Igor Daniloff ,
    "Anarchy in the USSR," Virus Bulletin, October 1997,
    pp. 6-8.

    52. Lakub Kaminski ,
    "Hidden Partitions vs. Multipartite VirusesI'll be back!," Virus Bulletin Conference, 1996.

    53. Peter Szor ,
    "Junkie Memorial," Virus Bulletin, September 1997,
    pp. 6-8.

    54. Dr. Igor Muttik ,
    "3apa3a," http://www.f-secure.com/v-descs/3apa3a.shtml, 1994.

    55.
    "Buffer Overrun in JPEG Processing (GDI+) Could Allow Code Execution," MS04-028,


    • / 191