textfiles/virus/virusbib.txt

119 lines
4.4 KiB
Plaintext
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

Ted Landberg
02/24/88
Bibliography
for
Computer Viruses
Boebert, W. E., Kain, R.Y.; A Practical Alternative to
Hierarchical Integrity Policies; Proceeding of the 8th National
Computer Security Conference, Gaithersburg MD, Oct 1985
Boebert, W. E., Ferguson, C.T.; A Partial Solution to the
Discretionary Trojan Horse Problem; Proceeding of the 8th
National Computer Security Conference, Gaithersburg MD, Oct 1985
Cohen, Fred; Computer Viruses, Theory and Experiments; 7th
Security Conference, DOD/NBS Sept 1984.
Denning D. E.; Cyptography and Data Security; Addison Wesley,
1982
Denning, D. E.; An Intrusion-Detection Model; IEEE Symposium on
Security and Privacy, April 1986.
Dewdney, A. K.; Computer Recreations - In the game called Core
War hostile programs engage in a battle of bits; Scientific
American; Mar 1984.
Dewdney, A. K.; Computer Recreations - A Core War bestiary of
viruses, worms and other threats to computer memories; Scientific
American; Mar 1985.
Dvorak, John; Virus Wars: A Serious Warning; PC Magazine; Feb 29,
1988.
Gilgor, V.D.; On the Design and the Implementation of Secure
Xenix Workstation; IEEE Symposium on Security and Privacy, April
1987.
Grampp, F.T. and Morris, R. H.; UNIX Operating System Security;
AT&T Bell Laboroatories Technical Journal, Oct 1984.
Harrison, M.A. and Ruzzo, W.L.; Protection in Operating Systems;
Comm of the ACM, Aug 1976.
Highland, Harold J.; From the Editor -- Computer Viruses;
Computers & Security; Aug 1987.
Israel, Howard; Computer Viruses: Myth or Reality ?; Proceeding
of the 10th National Computer Security Conference, Gaithersburg
MD, Sept 1987.
Computer Virus
Bibliography
Joseph, Mark K.; Toward the Elimination of the Effects of
Malicious Logic: Fault Tolerance Approaches; Proceeding of the
10th National Computer Security Conference, Gaithersburg MD, Sept
1987
Karser, Paul A.; Limiting the Damage Potential of Discretionary
Trojan Horses; Proceedings of the Symposium on Security and
Privacy 1987; Oakland CA, Published by the IEEE.
Lapid, Ahituv, and Newmann; Approaches to Handing 'Trojan Horse'
Threats; Computer & Security; Sept 1986.
McLellan, Vin; Computer Systems Under Siege; The New York Times,
January 31, 1988.
Novitski, P.; Trojan horses (telecommunicating data files inside
documents); Access 86; Oct 86. [not available]
Parker, T.; Public domain software review: Trojans revisited,
CROBOTS, and ATC; Computer Language; April 1987.
Pozzo, M.M., Gray, T.E.; An approach to containing computer
viruses; Computer & Security, Aug 1987.
Pozza, M.M., Gray, T.E.; Managing Exposure to Potentially
Malicious Rograms; Proceeding of the 9th National Computer
Security Conference, Gaithersburg MD, Sept 1986.
Reeds, J. A. and Weinberger, P. J.; File Security and the UNIX
Systems Crypt Command; AT&T Bell Laboratories Journal, Oct 1984
Reid, T. R.; Fending Off a 'Computer Virus' Means Taking Only a
Few Precautions; Washington Post, Feb 15, 1988.
Rivers, Angel; Collection of published and unpublished newspaper
articles and reference materials about Computer Viruses; IRS,
1987.
Rutz, Frank; DOD Fights Off Computer Virus; Government Computer
News; Feb 5, 1988.
Shoch, J.F and Hupp, J.A.; The 'Worm' Programs: Early Experience
with a Distributed Computation. Comm of ACM, Mar 1982.
Stoll, Cliff; What do you Reed a Trojan Horse; Proceeding of the
10th National Computer Security Conference, Gaithersburg MD, Sept
1985
Computer Virus
Bibliography
Thompson, K.; Reflections on Trusting Trust (Deliberate Software
Bugs); Communications of the ACM, Aug 1984.
Witten, I. H.; Computer (In)security: infiltrating open systems;
Abacus (USA) Summer 1987.
Young, Catherine L.; Taxonomy of Computer Virus Defense
Mechanisms; Proceeding of the 10th National Computer Security
Conference, Gaithersburg MD, Sept 1987.
2600 Magazine; Series of Articles on Computer Penetration
techniques.
. ... ...-....1200 N81N ......................... ... ...-....