THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources]

Peter Szor

نسخه متنی -صفحه : 191/ 49
نمايش فراداده

  • References

    1. Dr. Vesselin Bontchev , "Methodology of Computer Anti-Virus Research," University of Hamburg, Dissertation, 1998.

    2. Dr. Harold Highland , "A Macro Virus," Computers & Security, August 1989, pp. 178-188.

    3. Joe Wells , "Brief History of Computer Viruses," 1996, http://www.research.ibm.com/antivirus/timeline.

    4. Dr. Peter Lammer , "Jonah's Journey," Virus Bulletin, November 1990, p. 20.

    5. Peter Ferrie , personal communication, 2004.

    6. Jim Bates , "WHALE...A Dinosaur Heading For Extinction," Virus Bulletin, November 1990, pp. 17-19.

    7. Eric Chien , "Malicious Threats to Personal Digital Assistants," Symantec, 2000.

    8. Dr. Alan Solomon , "A Brief History of Viruses," EICAR, 1994, pp. 117-129.

    9. Intel Pentium Processor III Specification Update, http://www.intel.com/design/PentiumIII/specupdt/24445349.pdf.

    10. Mikko Hypponen , Private Communication, 1996.

    11. Thomas Lipp , "Computerviren," 64'er, Markt&Technik, March 1989.

    12. Peter Szor , "Stream of Consciousness," Virus Bulletin, October 2000, p. 6.

    13. Peter Szor and Peter Ferrie , "64-bit Rugrats," Virus Bulletin, July 2004, pp. 4-6.

    14. Marious Van Oers , "Linux VirusesELF File Format," Virus Bulletin Conference, 2000, pp. 381-400.

    15. Jakub Kaminski , "Not So Quiet on the Linux Front: Linux Malware II," Virus Bulletin Conference, 2001, pp. 147-172.

    16. Eugene Kaspersky , "Shifter.983," http://www.viruslist.com, 1993.

    17. Sarah Gordon , "What a (Winword.) Concept," Virus Bulletin, September 1995, pp. 8-9.

    18. Sarah Gordon , "Excel Yourself!" Virus Bulletin, August 1996, pp. 9-10.

    19. Yoshihiro Yasuda , personal communication, 2004.

    20. Dr. Igor Muttik , "Macro VirusesPart 1," Virus Bulletin, September 1999, pp. 13-14.

    21. Dr. Vesselin Bontchev , "The Pros and Cons of WordBasic Virus Up-conversion," Virus Bulletin Conference, 1998, pp. 153-172.

    22. Dr. Vesselin Bontchev , "Possible Macro Virus Attacks and How to Prevent Them," Virus Bulletin Conference, 1996, pp. 97-127.

    23. Dr. Vesselin Bontchev , "Solving the VBA Up-conversion Problem," Virus Bulletin Conference, 2001, pp. 273-300.

    24. Nick FitzGerald , "If the CAP Fits," Virus Bulletin, September 1999, pp. 6-7.

    25. Jimmy Kuo , "Free Anti-Virus Tips and Techniques: Common Sense to Protect Yourself from Macro Viruses," NAI White Paper, 2000.

    26. Dr. Vesselin Bontchev , personal communication, 2004.

    27. Jakub Kaminski , "Disappearing MacrosNatural Devolution of Up-converted Macro Viruses," Virus Bulletin Conference, 1998, pp. 139-151.

    28. Katrin Tocheva , "Multiple Infections," Virus Bulletin, 1999, pp. 301-314.

    29. Dr. Richard Ford , "Richard's Problem," private communication on VMACRO mailing list, 1997.

    30. Dr. Vesselin Bontchev , "Macro Virus Identification Problems," Virus Bulletin Conference, 1997, pp. 157-196.

    31. Dr. Vesselin Bontchev , private communication, 1998.

    32. Vesselin Bontchev , "No Peace on the Excel Front," Virus Bulletin, April 1998, pp. 16-17.

    33. Gabor Szappanos , "XML Heaven," Virus Bulletin, February 2003, pp. 8-9.

    34. Peter G. Capek, David M. Chess, Alan Fedeli, and Dr. Steve R. White , "Merry Christmas: An Early Network Worm," IEEE Security & Privacy, http://www.computer.org/security/v1n5/j5cap.

    35. Dr. Klaus Brunnstein , "Computer 'Beastware': Trojan Horses, Viruses, WormsA Survey," HISEC'93, 1993.

    36. David Ferbrache , "A Pathology of Computer Viruses," Springer-Verlag, 1992, ISBN: 3-540-19610-2.

    37. Peter Szor , "Warped Logic?" Virus Bulletin, June 2001, pp. 5-6.

    38. Mikhail Pavlyushchik , "Virus Mapping," Virus Bulletin, November 2003, pp. 4-5.

    39. Eugene Kaspersky , "Don't Press F1," Virus Bulletin, January 2000, pp. 7-8.

    40. Peter Szor , "Sharpei Behaviour," Virus Bulletin, April 2002, pp. 4-5.

    41. Gabor Kiss , "SWF/LFM-926Flash in the Pan?" Virus Bulletin, February 2002, p. 6.

    42. Dmitry Gryaznov , private communication, 2004.

    43. Sami Rautiainen , private communication, 2004.

    44. Philip Hannay and Richard Wang , "MSIL for the .NET Framework: The Next Battleground?," Virus Bulletin Conference, 2001, pp. 173-196.

    45. Peter Szor , "Tasting Donut," Virus Bulletin, March 2002, pp. 6-8.

    46. Peter Ferrie , "The Beagle Has Landed," http://www.virusbtn.com/resources/viruses/indepth/beagle.xml.

    47. Eugene Kaspersky , "Zhengxi: Saucerful of Secrets," Virus Bulletin, April 1996, pp. 8-10.

    48. Roger A. Grimes , Malicious Mobile Code, O'Reilly, 2001, ISBN: 1-56592-682-X (Paperback).

    49. Ken Thomson , "Reflections on Trusting Trust," Communication of the ACM, Vol. 27, No. 8, August 1984, pp. 761-763, http://cm.bell-labs.com/who/ken/trus184.

    50. Peter Szor , "Pocket Monsters," Virus Bulletin, August 2001, pp. 8-9.

    51. Igor Daniloff , "Anarchy in the USSR," Virus Bulletin, October 1997, pp. 6-8.

    52. Lakub Kaminski , "Hidden Partitions vs. Multipartite VirusesI'll be back!," Virus Bulletin Conference, 1996.

    53. Peter Szor , "Junkie Memorial," Virus Bulletin, September 1997, pp. 6-8.

    54. Dr. Igor Muttik , "3apa3a," http://www.f-secure.com/v-descs/3apa3a.l, 1994.

    55. "Buffer Overrun in JPEG Processing (GDI+) Could Allow Code Execution," MS04-028,