119 lines
4.4 KiB
Plaintext
119 lines
4.4 KiB
Plaintext
|
Ted Landberg
|
|||
|
02/24/88
|
|||
|
|
|||
|
Bibliography
|
|||
|
for
|
|||
|
Computer Viruses
|
|||
|
|
|||
|
|
|||
|
Boebert, W. E., Kain, R.Y.; A Practical Alternative to
|
|||
|
Hierarchical Integrity Policies; Proceeding of the 8th National
|
|||
|
Computer Security Conference, Gaithersburg MD, Oct 1985
|
|||
|
|
|||
|
Boebert, W. E., Ferguson, C.T.; A Partial Solution to the
|
|||
|
Discretionary Trojan Horse Problem; Proceeding of the 8th
|
|||
|
National Computer Security Conference, Gaithersburg MD, Oct 1985
|
|||
|
|
|||
|
Cohen, Fred; Computer Viruses, Theory and Experiments; 7th
|
|||
|
Security Conference, DOD/NBS Sept 1984.
|
|||
|
|
|||
|
Denning D. E.; Cyptography and Data Security; Addison Wesley,
|
|||
|
1982
|
|||
|
|
|||
|
Denning, D. E.; An Intrusion-Detection Model; IEEE Symposium on
|
|||
|
Security and Privacy, April 1986.
|
|||
|
|
|||
|
Dewdney, A. K.; Computer Recreations - In the game called Core
|
|||
|
War hostile programs engage in a battle of bits; Scientific
|
|||
|
American; Mar 1984.
|
|||
|
|
|||
|
Dewdney, A. K.; Computer Recreations - A Core War bestiary of
|
|||
|
viruses, worms and other threats to computer memories; Scientific
|
|||
|
American; Mar 1985.
|
|||
|
|
|||
|
Dvorak, John; Virus Wars: A Serious Warning; PC Magazine; Feb 29,
|
|||
|
1988.
|
|||
|
|
|||
|
Gilgor, V.D.; On the Design and the Implementation of Secure
|
|||
|
Xenix Workstation; IEEE Symposium on Security and Privacy, April
|
|||
|
1987.
|
|||
|
|
|||
|
Grampp, F.T. and Morris, R. H.; UNIX Operating System Security;
|
|||
|
AT&T Bell Laboroatories Technical Journal, Oct 1984.
|
|||
|
|
|||
|
Harrison, M.A. and Ruzzo, W.L.; Protection in Operating Systems;
|
|||
|
Comm of the ACM, Aug 1976.
|
|||
|
|
|||
|
Highland, Harold J.; From the Editor -- Computer Viruses;
|
|||
|
Computers & Security; Aug 1987.
|
|||
|
|
|||
|
Israel, Howard; Computer Viruses: Myth or Reality ?; Proceeding
|
|||
|
of the 10th National Computer Security Conference, Gaithersburg
|
|||
|
MD, Sept 1987.
|
|||
|
Computer Virus
|
|||
|
Bibliography
|
|||
|
|
|||
|
Joseph, Mark K.; Toward the Elimination of the Effects of
|
|||
|
Malicious Logic: Fault Tolerance Approaches; Proceeding of the
|
|||
|
10th National Computer Security Conference, Gaithersburg MD, Sept
|
|||
|
1987
|
|||
|
|
|||
|
Karser, Paul A.; Limiting the Damage Potential of Discretionary
|
|||
|
Trojan Horses; Proceedings of the Symposium on Security and
|
|||
|
Privacy 1987; Oakland CA, Published by the IEEE.
|
|||
|
|
|||
|
Lapid, Ahituv, and Newmann; Approaches to Handing 'Trojan Horse'
|
|||
|
Threats; Computer & Security; Sept 1986.
|
|||
|
|
|||
|
McLellan, Vin; Computer Systems Under Siege; The New York Times,
|
|||
|
January 31, 1988.
|
|||
|
|
|||
|
Novitski, P.; Trojan horses (telecommunicating data files inside
|
|||
|
documents); Access 86; Oct 86. [not available]
|
|||
|
|
|||
|
Parker, T.; Public domain software review: Trojans revisited,
|
|||
|
CROBOTS, and ATC; Computer Language; April 1987.
|
|||
|
|
|||
|
Pozzo, M.M., Gray, T.E.; An approach to containing computer
|
|||
|
viruses; Computer & Security, Aug 1987.
|
|||
|
|
|||
|
Pozza, M.M., Gray, T.E.; Managing Exposure to Potentially
|
|||
|
Malicious Rograms; Proceeding of the 9th National Computer
|
|||
|
Security Conference, Gaithersburg MD, Sept 1986.
|
|||
|
|
|||
|
Reeds, J. A. and Weinberger, P. J.; File Security and the UNIX
|
|||
|
Systems Crypt Command; AT&T Bell Laboratories Journal, Oct 1984
|
|||
|
|
|||
|
Reid, T. R.; Fending Off a 'Computer Virus' Means Taking Only a
|
|||
|
Few Precautions; Washington Post, Feb 15, 1988.
|
|||
|
|
|||
|
Rivers, Angel; Collection of published and unpublished newspaper
|
|||
|
articles and reference materials about Computer Viruses; IRS,
|
|||
|
1987.
|
|||
|
|
|||
|
Rutz, Frank; DOD Fights Off Computer Virus; Government Computer
|
|||
|
News; Feb 5, 1988.
|
|||
|
|
|||
|
Shoch, J.F and Hupp, J.A.; The 'Worm' Programs: Early Experience
|
|||
|
with a Distributed Computation. Comm of ACM, Mar 1982.
|
|||
|
|
|||
|
Stoll, Cliff; What do you Reed a Trojan Horse; Proceeding of the
|
|||
|
10th National Computer Security Conference, Gaithersburg MD, Sept
|
|||
|
1985
|
|||
|
Computer Virus
|
|||
|
Bibliography
|
|||
|
|
|||
|
Thompson, K.; Reflections on Trusting Trust (Deliberate Software
|
|||
|
Bugs); Communications of the ACM, Aug 1984.
|
|||
|
|
|||
|
Witten, I. H.; Computer (In)security: infiltrating open systems;
|
|||
|
Abacus (USA) Summer 1987.
|
|||
|
|
|||
|
Young, Catherine L.; Taxonomy of Computer Virus Defense
|
|||
|
Mechanisms; Proceeding of the 10th National Computer Security
|
|||
|
Conference, Gaithersburg MD, Sept 1987.
|
|||
|
|
|||
|
2600 Magazine; Series of Articles on Computer Penetration
|
|||
|
techniques.
|
|||
|
|
|||
|
. ... ...-.... |