119 lines
4.4 KiB
Plaintext
119 lines
4.4 KiB
Plaintext
Ted Landberg
|
||
02/24/88
|
||
|
||
Bibliography
|
||
for
|
||
Computer Viruses
|
||
|
||
|
||
Boebert, W. E., Kain, R.Y.; A Practical Alternative to
|
||
Hierarchical Integrity Policies; Proceeding of the 8th National
|
||
Computer Security Conference, Gaithersburg MD, Oct 1985
|
||
|
||
Boebert, W. E., Ferguson, C.T.; A Partial Solution to the
|
||
Discretionary Trojan Horse Problem; Proceeding of the 8th
|
||
National Computer Security Conference, Gaithersburg MD, Oct 1985
|
||
|
||
Cohen, Fred; Computer Viruses, Theory and Experiments; 7th
|
||
Security Conference, DOD/NBS Sept 1984.
|
||
|
||
Denning D. E.; Cyptography and Data Security; Addison Wesley,
|
||
1982
|
||
|
||
Denning, D. E.; An Intrusion-Detection Model; IEEE Symposium on
|
||
Security and Privacy, April 1986.
|
||
|
||
Dewdney, A. K.; Computer Recreations - In the game called Core
|
||
War hostile programs engage in a battle of bits; Scientific
|
||
American; Mar 1984.
|
||
|
||
Dewdney, A. K.; Computer Recreations - A Core War bestiary of
|
||
viruses, worms and other threats to computer memories; Scientific
|
||
American; Mar 1985.
|
||
|
||
Dvorak, John; Virus Wars: A Serious Warning; PC Magazine; Feb 29,
|
||
1988.
|
||
|
||
Gilgor, V.D.; On the Design and the Implementation of Secure
|
||
Xenix Workstation; IEEE Symposium on Security and Privacy, April
|
||
1987.
|
||
|
||
Grampp, F.T. and Morris, R. H.; UNIX Operating System Security;
|
||
AT&T Bell Laboroatories Technical Journal, Oct 1984.
|
||
|
||
Harrison, M.A. and Ruzzo, W.L.; Protection in Operating Systems;
|
||
Comm of the ACM, Aug 1976.
|
||
|
||
Highland, Harold J.; From the Editor -- Computer Viruses;
|
||
Computers & Security; Aug 1987.
|
||
|
||
Israel, Howard; Computer Viruses: Myth or Reality ?; Proceeding
|
||
of the 10th National Computer Security Conference, Gaithersburg
|
||
MD, Sept 1987.
|
||
Computer Virus
|
||
Bibliography
|
||
|
||
Joseph, Mark K.; Toward the Elimination of the Effects of
|
||
Malicious Logic: Fault Tolerance Approaches; Proceeding of the
|
||
10th National Computer Security Conference, Gaithersburg MD, Sept
|
||
1987
|
||
|
||
Karser, Paul A.; Limiting the Damage Potential of Discretionary
|
||
Trojan Horses; Proceedings of the Symposium on Security and
|
||
Privacy 1987; Oakland CA, Published by the IEEE.
|
||
|
||
Lapid, Ahituv, and Newmann; Approaches to Handing 'Trojan Horse'
|
||
Threats; Computer & Security; Sept 1986.
|
||
|
||
McLellan, Vin; Computer Systems Under Siege; The New York Times,
|
||
January 31, 1988.
|
||
|
||
Novitski, P.; Trojan horses (telecommunicating data files inside
|
||
documents); Access 86; Oct 86. [not available]
|
||
|
||
Parker, T.; Public domain software review: Trojans revisited,
|
||
CROBOTS, and ATC; Computer Language; April 1987.
|
||
|
||
Pozzo, M.M., Gray, T.E.; An approach to containing computer
|
||
viruses; Computer & Security, Aug 1987.
|
||
|
||
Pozza, M.M., Gray, T.E.; Managing Exposure to Potentially
|
||
Malicious Rograms; Proceeding of the 9th National Computer
|
||
Security Conference, Gaithersburg MD, Sept 1986.
|
||
|
||
Reeds, J. A. and Weinberger, P. J.; File Security and the UNIX
|
||
Systems Crypt Command; AT&T Bell Laboratories Journal, Oct 1984
|
||
|
||
Reid, T. R.; Fending Off a 'Computer Virus' Means Taking Only a
|
||
Few Precautions; Washington Post, Feb 15, 1988.
|
||
|
||
Rivers, Angel; Collection of published and unpublished newspaper
|
||
articles and reference materials about Computer Viruses; IRS,
|
||
1987.
|
||
|
||
Rutz, Frank; DOD Fights Off Computer Virus; Government Computer
|
||
News; Feb 5, 1988.
|
||
|
||
Shoch, J.F and Hupp, J.A.; The 'Worm' Programs: Early Experience
|
||
with a Distributed Computation. Comm of ACM, Mar 1982.
|
||
|
||
Stoll, Cliff; What do you Reed a Trojan Horse; Proceeding of the
|
||
10th National Computer Security Conference, Gaithersburg MD, Sept
|
||
1985
|
||
Computer Virus
|
||
Bibliography
|
||
|
||
Thompson, K.; Reflections on Trusting Trust (Deliberate Software
|
||
Bugs); Communications of the ACM, Aug 1984.
|
||
|
||
Witten, I. H.; Computer (In)security: infiltrating open systems;
|
||
Abacus (USA) Summer 1987.
|
||
|
||
Young, Catherine L.; Taxonomy of Computer Virus Defense
|
||
Mechanisms; Proceeding of the 10th National Computer Security
|
||
Conference, Gaithersburg MD, Sept 1987.
|
||
|
||
2600 Magazine; Series of Articles on Computer Penetration
|
||
techniques.
|
||
|
||
. ... ...-.... |