References
1. Dr. Vesselin Bontchev ,
"Methodology of Computer Anti-Virus Research," University of Hamburg, Dissertation, 1998.
2. Dr. Harold Highland ,
"A Macro Virus," Computers & Security, August 1989,
pp. 178-188.
3. Joe Wells ,
"Brief History of Computer Viruses," 1996, http://www.research.ibm.com/antivirus/timeline.
4. Dr. Peter Lammer ,
"Jonah's Journey," Virus Bulletin, November 1990,
p. 20.
5. Peter Ferrie , personal communication, 2004.
6. Jim Bates ,
"WHALE...A Dinosaur Heading For Extinction," Virus Bulletin, November 1990,
pp. 17-19.
7. Eric Chien ,
"Malicious Threats to Personal Digital Assistants," Symantec, 2000.
8. Dr. Alan Solomon ,
"A Brief History of Viruses," EICAR, 1994,
pp. 117-129.
9. Intel Pentium Processor III Specification Update, http://www.intel.com/design/PentiumIII/specupdt/24445349.pdf.
10. Mikko Hypponen , Private Communication, 1996.
11. Thomas Lipp ,
"Computerviren," 64'er, Markt&Technik, March 1989.
12. Peter Szor ,
"Stream of Consciousness," Virus Bulletin, October 2000,
p. 6.
13. Peter Szor and Peter Ferrie ,
"64-bit Rugrats," Virus Bulletin, July 2004,
pp. 4-6.
14. Marious Van Oers ,
"Linux VirusesELF File Format," Virus Bulletin Conference, 2000,
pp. 381-400.
15. Jakub Kaminski ,
"Not So Quiet on the Linux Front: Linux Malware II," Virus Bulletin Conference, 2001,
pp. 147-172.
16. Eugene Kaspersky ,
"Shifter.983," http://www.viruslist.com, 1993.
17. Sarah Gordon ,
"What a (Winword.) Concept," Virus Bulletin, September 1995,
pp. 8-9.
18. Sarah Gordon ,
"Excel Yourself!" Virus Bulletin, August 1996,
pp. 9-10.
19. Yoshihiro Yasuda , personal communication, 2004.
20. Dr. Igor Muttik ,
"Macro VirusesPart 1," Virus Bulletin, September 1999,
pp. 13-14.
21. Dr. Vesselin Bontchev ,
"The Pros and Cons of WordBasic Virus Up-conversion," Virus Bulletin Conference, 1998,
pp. 153-172.
22. Dr. Vesselin Bontchev ,
"Possible Macro Virus Attacks and How to Prevent Them," Virus Bulletin Conference, 1996,
pp. 97-127.
23. Dr. Vesselin Bontchev ,
"Solving the VBA Up-conversion Problem," Virus Bulletin Conference, 2001,
pp. 273-300.
24. Nick FitzGerald ,
"If the CAP Fits," Virus Bulletin, September 1999,
pp. 6-7.
25. Jimmy Kuo ,
"Free Anti-Virus Tips and Techniques: Common Sense to Protect Yourself from Macro Viruses," NAI White Paper, 2000.
26. Dr. Vesselin Bontchev , personal communication, 2004.
27. Jakub Kaminski ,
"Disappearing MacrosNatural Devolution of Up-converted Macro Viruses," Virus Bulletin Conference, 1998,
pp. 139-151.
28. Katrin Tocheva ,
"Multiple Infections," Virus Bulletin, 1999,
pp. 301-314.
29. Dr. Richard Ford ,
"Richard's Problem," private communication on VMACRO mailing list, 1997.
30. Dr. Vesselin Bontchev ,
"Macro Virus Identification Problems," Virus Bulletin Conference, 1997,
pp. 157-196.
31. Dr. Vesselin Bontchev , private communication, 1998.
32. Vesselin Bontchev ,
"No Peace on the Excel Front," Virus Bulletin, April 1998,
pp. 16-17.
33. Gabor Szappanos ,
"XML Heaven," Virus Bulletin, February 2003,
pp. 8-9.
34. Peter G. Capek, David M. Chess, Alan Fedeli, and Dr. Steve R. White ,
"Merry Christmas: An Early Network Worm," IEEE Security & Privacy, http://www.computer.org/security/v1n5/j5cap.
35. Dr. Klaus Brunnstein ,
"Computer 'Beastware': Trojan Horses, Viruses, WormsA Survey," HISEC'93, 1993.
36. David Ferbrache ,
"A Pathology of Computer Viruses," Springer-Verlag, 1992, ISBN: 3-540-19610-2.
37. Peter Szor ,
"Warped Logic?" Virus Bulletin, June 2001,
pp. 5-6.
38. Mikhail Pavlyushchik ,
"Virus Mapping," Virus Bulletin, November 2003,
pp. 4-5.
39. Eugene Kaspersky ,
"Don't Press F1," Virus Bulletin, January 2000,
pp. 7-8.
40. Peter Szor ,
"Sharpei Behaviour," Virus Bulletin, April 2002,
pp. 4-5.
41. Gabor Kiss ,
"SWF/LFM-926Flash in the Pan?" Virus Bulletin, February 2002,
p. 6.
42. Dmitry Gryaznov , private communication, 2004.
43. Sami Rautiainen , private communication, 2004.
44. Philip Hannay and Richard Wang ,
"MSIL for the .NET Framework: The Next Battleground?," Virus Bulletin Conference, 2001,
pp. 173-196.
45. Peter Szor ,
"Tasting Donut," Virus Bulletin, March 2002,
pp. 6-8.
46. Peter Ferrie ,
"The Beagle Has Landed," http://www.virusbtn.com/resources/viruses/indepth/beagle.xml.
47. Eugene Kaspersky ,
"Zhengxi: Saucerful of Secrets," Virus Bulletin, April 1996,
pp. 8-10.
48. Roger A. Grimes , Malicious Mobile Code, O'Reilly, 2001, ISBN: 1-56592-682-X (Paperback).
49. Ken Thomson ,
"Reflections on Trusting Trust," Communication of the ACM, Vol. 27, No. 8, August 1984,
pp. 761-763, http://cm.bell-labs.com/who/ken/trus184.
50. Peter Szor ,
"Pocket Monsters," Virus Bulletin, August 2001,
pp. 8-9.
51. Igor Daniloff ,
"Anarchy in the USSR," Virus Bulletin, October 1997,
pp. 6-8.
52. Lakub Kaminski ,
"Hidden Partitions vs. Multipartite VirusesI'll be back!," Virus Bulletin Conference, 1996.
53. Peter Szor ,
"Junkie Memorial," Virus Bulletin, September 1997,
pp. 6-8.
54. Dr. Igor Muttik ,
"3apa3a," http://www.f-secure.com/v-descs/3apa3a.l, 1994.
55.
"Buffer Overrun in JPEG Processing (GDI+) Could Allow Code Execution," MS04-028, |