References
1. Peter Szor ,
"The New 32-bit Medusa," Virus Bulletin, December 2000,
pp. 8-10.
2. Frans Veldman ,
"Why Do We Need Heuristics?" Virus Bulletin Conference, 1995,
pp. XI-XV.
3. Frans Veldman ,
"Combating Viruses Heuristically," Virus Bulletin Conference, September 1993, Amsterdam.
4. Rajeev Nagar ,
"Windows NT: File System Internals," O'Reilly, Sebastopol 1997, ISBN: 1-56592-249-2 (Paperback).
5. R. S. Boyer and J. S. Moore ,
"A Fast String Searching Algorithm," CACM, October 1997,
pp. 762-772.
6. Carey Nachenberg , personal communication, 1999.
7. Roger Riordan ,
"Polysearch: An Extremely Fast Parallel Search Algorithm," Computer Virus and Security Conference, 1992,
pp. 631-640.
8. Dr. Peter Lammer ,
"Cryptographic Checksums," Virus Bulletin, October 1990.
9. Fridrik Skulason and Dr. Vesselin Bontchev , personal communication, 1996.
10. Dr. Ferenc Leitold and Janos Csotai ,
"Virus Killing and Searching Language," Virus Bulletin Conference, 1994.
11. Frans Veldman ,
" Generic Decryptors: Emulators of the future," http://users.knoware.nl/users/veldman/frans/english/gde.
12. Frederic Perriot ,
"Ship of the Desert," Virus Bulletin, June 2004,
pp. 6-8.
13. Peter Ferrie and Peter Szor ,
"Zmist Opportunities," Virus Bulletin, March 2001,
pp. 6-7.
14. Frederic Perriot and Peter Ferrie ,
"Principles and Practice of X-raying," Virus Bulletin Conference, 2004,
pp. 51-65.
15. Eugene Kaspersky , personal communication, 1997.
16. Carey Nachenberg ,
"Staying Ahead of the Virus Writers: An In-Depth Look at Heuristics," Virus Bulletin Conference, 1998,
pp. 85-98.
17. Dr. Igor Muttik , personal communication, 2001.
18. Frederic Perriot ,
"Defeating Polymorphism Through Code Optimization," Virus Bulletin Conference, 2003.
19. Peter Szor and Peter Ferrie ,
"Hunting for Metamorphic," Virus Bulletin Conference, 2001,
pp. 123-144.
20. Andrian Marinescu ,
"ACG in the Hole," Virus Bulletin, July 1999,
pp. 8-9.
21. Dmitry O. Gryaznov ,
"Scanners of the Year 2000: Heuristics," Virus Bulletin Conference, 1995,
pp. 225-234.
22. Kurt Natvig ,
"Sandbox II: Internet," Virus Bulletin Conference, 2002,
pp. 125-141.
23. Peter Ferrie ,
"Magisterium Abraxas," Virus Bulletin, May 2001,
pp. 6-7.
24. Gabor Szappanos ,
"VBA Emulator Engine Design," Virus Bulletin Conference, 2001,
pp. 373-388.
25. Peter Szor ,
"Attacks on Win32," Virus Bulletin Conference, 1998.
26. Glenn Coates and David Leigh ,
"Virus Detection: The Brainy Way," Virus Bulletin Conference, 1995,
pp. 211-224.
27. Righard Zwienenberg ,
"Heuristics Scanners: Artificial Intelligence?," Virus Bulletin Conference, 1995,
pp. 203-210.
28. Costin Raiu ,
"Defeating the 7-headed monster," http://craiu.pcnet.ro/papers.
29. Gerald Tesauro, Jeffrey O. Kephart, Gregory B. Sorkin ,
"Neural Networks for Computer Virus Recognition," IEEE Expert, Vol. 11, No. 4, August 1996,
pp. 5-6.
30. William Arnold and Gerald Tesauro ,
"Automatically Generated Win32 Heuristic Virus Detection," Virus Bulletin Conference, September 2000,
pp. 123-132.
31. John Von Neumann , The Computer and the Brain, Yale University, 2000, 1958, ISBN: 0-300-08473-0 (Paperback).
32. Peter Szor ,
"Generic Disinfection," Virus Bulletin Conference, 1996.
33. Frans Veldman , Documentation of TBCLEAN.
34. Dr. Alan Solomon , personal communication, 1996.
35. Dr. Alan Solomon ,
"PC Viruses: Detection, Analysis and Cure," Springer Verlag, 1991.
36. Carey Nachenberg and Alex Haddox ,
"Generic Decryption Scanners: The Problems," Virus Bulletin, August 1996,
pp. 6-8.
37. Dr. Frederick B. Cohen , A Short Course on Computer Viruses, Wiley, 2nd Edition, 1994, ISBN: 0471007684.
38. Ronald L. Rivest ,
"The MD5 Message-Digest Algorithm," RFC 1321, April 1992.
39. Yisrael Radai ,
"Checksumming Techniques for Anti-Viral Purposes," Virus Bulletin Conference, 1991,
pp. 39-68.
40. Dr. Frederick Cohen ,
"A Note on High-Integrity PC Bootstrapping," Computers & Security, 10, 1991,
pp. 535-539.
41. Mikko Hypponen ,
"Putting Macros Under Control," Virus Bulletin, 1998,
pp. 289-300.
42. Vesselin Bontchev ,
"Possible Virus Attacks Against Integrity Programs and How to Prevent Them," Virus Bulletin Conference, 1992,
pp. 131-141.
43. Dr. Frederick Cohen ,
"Models of Practical Defenses Against Computer Viruses," Computers & Security, 8, 1989,
pp. 149-160.
44. Dr. Vesselin Bontchev , personal communication, 2004.
45. Morton Swimmer ,
"Virus Intrusion Detection Expert System," EICAR, 1995.
46. Costin Raiu ,
"Suspicious Behaviour: Heuristic Detection of Win32 Backdoors," Virus Bulletin Conference, 1999,
pp. 109-124. |