Table of Contents
Previous Section Next Section

References

1. Dr. Vesselin Bontchev , "Methodology of Computer Anti-Virus Research," University of Hamburg, Dissertation, 1998.

2. Dr. Harold Highland , "A Macro Virus," Computers & Security, August 1989, pp. 178-188.

3. Joe Wells , "Brief History of Computer Viruses," 1996, http://www.research.ibm.com/antivirus/timeline.htm.

4. Dr. Peter Lammer , "Jonah's Journey," Virus Bulletin, November 1990, p. 20.

5. Peter Ferrie , personal communication, 2004.

6. Jim Bates , "WHALE...A Dinosaur Heading For Extinction," Virus Bulletin, November 1990, pp. 17-19.

7. Eric Chien , "Malicious Threats to Personal Digital Assistants," Symantec, 2000.

8. Dr. Alan Solomon , "A Brief History of Viruses," EICAR, 1994, pp. 117-129.

9. Intel Pentium Processor III Specification Update, http://www.intel.com/design/PentiumIII/specupdt/24445349.pdf.

10. Mikko Hypponen , Private Communication, 1996.

11. Thomas Lipp , "Computerviren," 64'er, Markt&Technik, March 1989.

12. Peter Szor , "Stream of Consciousness," Virus Bulletin, October 2000, p. 6.

13. Peter Szor and Peter Ferrie , "64-bit Rugrats," Virus Bulletin, July 2004, pp. 4-6.

14. Marious Van Oers , "Linux VirusesELF File Format," Virus Bulletin Conference, 2000, pp. 381-400.

15. Jakub Kaminski , "Not So Quiet on the Linux Front: Linux Malware II," Virus Bulletin Conference, 2001, pp. 147-172.

16. Eugene Kaspersky , "Shifter.983," http://www.viruslist.com, 1993.

17. Sarah Gordon , "What a (Winword.) Concept," Virus Bulletin, September 1995, pp. 8-9.

18. Sarah Gordon , "Excel Yourself!" Virus Bulletin, August 1996, pp. 9-10.

19. Yoshihiro Yasuda , personal communication, 2004.

20. Dr. Igor Muttik , "Macro VirusesPart 1," Virus Bulletin, September 1999, pp. 13-14.

21. Dr. Vesselin Bontchev , "The Pros and Cons of WordBasic Virus Up-conversion," Virus Bulletin Conference, 1998, pp. 153-172.

22. Dr. Vesselin Bontchev , "Possible Macro Virus Attacks and How to Prevent Them," Virus Bulletin Conference, 1996, pp. 97-127.

23. Dr. Vesselin Bontchev , "Solving the VBA Up-conversion Problem," Virus Bulletin Conference, 2001, pp. 273-300.

24. Nick FitzGerald , "If the CAP Fits," Virus Bulletin, September 1999, pp. 6-7.

25. Jimmy Kuo , "Free Anti-Virus Tips and Techniques: Common Sense to Protect Yourself from Macro Viruses," NAI White Paper, 2000.

26. Dr. Vesselin Bontchev , personal communication, 2004.

27. Jakub Kaminski , "Disappearing MacrosNatural Devolution of Up-converted Macro Viruses," Virus Bulletin Conference, 1998, pp. 139-151.

28. Katrin Tocheva , "Multiple Infections," Virus Bulletin, 1999, pp. 301-314.

29. Dr. Richard Ford , "Richard's Problem," private communication on VMACRO mailing list, 1997.

30. Dr. Vesselin Bontchev , "Macro Virus Identification Problems," Virus Bulletin Conference, 1997, pp. 157-196.

31. Dr. Vesselin Bontchev , private communication, 1998.

32. Vesselin Bontchev , "No Peace on the Excel Front," Virus Bulletin, April 1998, pp. 16-17.

33. Gabor Szappanos , "XML Heaven," Virus Bulletin, February 2003, pp. 8-9.

34. Peter G. Capek, David M. Chess, Alan Fedeli, and Dr. Steve R. White , "Merry Christmas: An Early Network Worm," IEEE Security & Privacy, http://www.computer.org/security/v1n5/j5cap.htm.

35. Dr. Klaus Brunnstein , "Computer 'Beastware': Trojan Horses, Viruses, WormsA Survey," HISEC'93, 1993.

36. David Ferbrache , "A Pathology of Computer Viruses," Springer-Verlag, 1992, ISBN: 3-540-19610-2.

37. Peter Szor , "Warped Logic?" Virus Bulletin, June 2001, pp. 5-6.

38. Mikhail Pavlyushchik , "Virus Mapping," Virus Bulletin, November 2003, pp. 4-5.

39. Eugene Kaspersky , "Don't Press F1," Virus Bulletin, January 2000, pp. 7-8.

40. Peter Szor , "Sharpei Behaviour," Virus Bulletin, April 2002, pp. 4-5.

41. Gabor Kiss , "SWF/LFM-926Flash in the Pan?" Virus Bulletin, February 2002, p. 6.

42. Dmitry Gryaznov , private communication, 2004.

43. Sami Rautiainen , private communication, 2004.

44. Philip Hannay and Richard Wang , "MSIL for the .NET Framework: The Next Battleground?," Virus Bulletin Conference, 2001, pp. 173-196.

45. Peter Szor , "Tasting Donut," Virus Bulletin, March 2002, pp. 6-8.

46. Peter Ferrie , "The Beagle Has Landed," http://www.virusbtn.com/resources/viruses/indepth/beagle.xml.

47. Eugene Kaspersky , "Zhengxi: Saucerful of Secrets," Virus Bulletin, April 1996, pp. 8-10.

48. Roger A. Grimes , Malicious Mobile Code, O'Reilly, 2001, ISBN: 1-56592-682-X (Paperback).

49. Ken Thomson , "Reflections on Trusting Trust," Communication of the ACM, Vol. 27, No. 8, August 1984, pp. 761-763, http://cm.bell-labs.com/who/ken/trust.html.

50. Peter Szor , "Pocket Monsters," Virus Bulletin, August 2001, pp. 8-9.

51. Igor Daniloff , "Anarchy in the USSR," Virus Bulletin, October 1997, pp. 6-8.

52. Lakub Kaminski , "Hidden Partitions vs. Multipartite VirusesI'll be back!," Virus Bulletin Conference, 1996.

53. Peter Szor , "Junkie Memorial," Virus Bulletin, September 1997, pp. 6-8.

54. Dr. Igor Muttik , "3apa3a," http://www.f-secure.com/v-descs/3apa3a.shtml, 1994.

55. "Buffer Overrun in JPEG Processing (GDI+) Could Allow Code Execution," MS04-028, http://www.microsoft.com/technet/security/bulletin/ms04-028.mspx.

    Table of Contents
    Previous Section Next Section