Computer viruses

作者: Fred Cohen

DOI: 10.1016/0167-4048(87)90122-2

关键词:

摘要: This paper introduces ''computer viruses'' and examines their potential for causing widespread damage to computer systems. Basic theoretical results are presented, the infeasibility of viral defense in large classes systems is shown. Defensive schemes presented several experiments described.

参考文章(19)
Noel T. Boaz, Richard Dawkins, The Selfish Gene Anthropological Quarterly. ,vol. 52, pp. 124- ,(1979) , 10.2307/3317264
GERALD J. POPEK, MARK KAMPE, CHARLES S. KLINE, ALLEN STOUGHTON, MICHAEL URBAN, EVELYN J. WALTON, UCLA Secure Unix 1979 International Workshop on Managing Requirements Knowledge (MARK). pp. 355- 364 ,(1979) , 10.1109/MARK.1979.8817171
J. F. SCHEID, P. D. WARD, B. D. GOLD, R. R. LINDE, R. J. PEELER, M. SCHAEFER, A security retrofit of VM/370 1979 International Workshop on Managing Requirements Knowledge (MARK). ,(1979) , 10.1109/MARK.1979.8817181
E. J. McCAULEY, P. J. DRONGOWSKI, KSOS—The design of a secure operating system * 1979 International Workshop on Managing Requirements Knowledge (MARK). pp. 345- 354 ,(1979) , 10.1109/MARK.1979.8817190
D. E. Bell, Secure Computer Systems: Mathematical Foundations and Model Technical Report ESD-TR-73-278-1. ,(1973)
Norman T. J. Bailey, The mathematical theory of epidemics ,(1957)
JOHN P. L. WOODWARD, Applications for multilevel secure operating systems 1979 International Workshop on Managing Requirements Knowledge (MARK). ,(1979) , 10.1109/MARK.1979.8817315
Dorothy Elizabeth Robling Denning, Cryptography and data security ,(1982)
J. B. Gunn, Use of virus functions to provide a virtual APL interpreter under user control international conference on apl. ,vol. 14, pp. 163- 168 ,(1984) , 10.1145/384283.801093