Table of Contents
Previous Section Next Section

References

1. Peter Szor , "The New 32-bit Medusa," Virus Bulletin, December 2000, pp. 8-10.

2. Frans Veldman , "Why Do We Need Heuristics?" Virus Bulletin Conference, 1995, pp. XI-XV.

3. Frans Veldman , "Combating Viruses Heuristically," Virus Bulletin Conference, September 1993, Amsterdam.

4. Rajeev Nagar , "Windows NT: File System Internals," O'Reilly, Sebastopol 1997, ISBN: 1-56592-249-2 (Paperback).

5. R. S. Boyer and J. S. Moore , "A Fast String Searching Algorithm," CACM, October 1997, pp. 762-772.

6. Carey Nachenberg , personal communication, 1999.

7. Roger Riordan , "Polysearch: An Extremely Fast Parallel Search Algorithm," Computer Virus and Security Conference, 1992, pp. 631-640.

8. Dr. Peter Lammer , "Cryptographic Checksums," Virus Bulletin, October 1990.

9. Fridrik Skulason and Dr. Vesselin Bontchev , personal communication, 1996.

10. Dr. Ferenc Leitold and Janos Csotai , "Virus Killing and Searching Language," Virus Bulletin Conference, 1994.

11. Frans Veldman , " Generic Decryptors: Emulators of the future," http://users.knoware.nl/users/veldman/frans/english/gde.htm.

12. Frederic Perriot , "Ship of the Desert," Virus Bulletin, June 2004, pp. 6-8.

13. Peter Ferrie and Peter Szor , "Zmist Opportunities," Virus Bulletin, March 2001, pp. 6-7.

14. Frederic Perriot and Peter Ferrie , "Principles and Practice of X-raying," Virus Bulletin Conference, 2004, pp. 51-65.

15. Eugene Kaspersky , personal communication, 1997.

16. Carey Nachenberg , "Staying Ahead of the Virus Writers: An In-Depth Look at Heuristics," Virus Bulletin Conference, 1998, pp. 85-98.

17. Dr. Igor Muttik , personal communication, 2001.

18. Frederic Perriot , "Defeating Polymorphism Through Code Optimization," Virus Bulletin Conference, 2003.

19. Peter Szor and Peter Ferrie , "Hunting for Metamorphic," Virus Bulletin Conference, 2001, pp. 123-144.

20. Andrian Marinescu , "ACG in the Hole," Virus Bulletin, July 1999, pp. 8-9.

21. Dmitry O. Gryaznov , "Scanners of the Year 2000: Heuristics," Virus Bulletin Conference, 1995, pp. 225-234.

22. Kurt Natvig , "Sandbox II: Internet," Virus Bulletin Conference, 2002, pp. 125-141.

23. Peter Ferrie , "Magisterium Abraxas," Virus Bulletin, May 2001, pp. 6-7.

24. Gabor Szappanos , "VBA Emulator Engine Design," Virus Bulletin Conference, 2001, pp. 373-388.

25. Peter Szor , "Attacks on Win32," Virus Bulletin Conference, 1998.

26. Glenn Coates and David Leigh , "Virus Detection: The Brainy Way," Virus Bulletin Conference, 1995, pp. 211-224.

27. Righard Zwienenberg , "Heuristics Scanners: Artificial Intelligence?," Virus Bulletin Conference, 1995, pp. 203-210.

28. Costin Raiu , "Defeating the 7-headed monster," http://craiu.pcnet.ro/papers.

29. Gerald Tesauro, Jeffrey O. Kephart, Gregory B. Sorkin , "Neural Networks for Computer Virus Recognition," IEEE Expert, Vol. 11, No. 4, August 1996, pp. 5-6.

30. William Arnold and Gerald Tesauro , "Automatically Generated Win32 Heuristic Virus Detection," Virus Bulletin Conference, September 2000, pp. 123-132.

31. John Von Neumann , The Computer and the Brain, Yale University, 2000, 1958, ISBN: 0-300-08473-0 (Paperback).

32. Peter Szor , "Generic Disinfection," Virus Bulletin Conference, 1996.

33. Frans Veldman , Documentation of TBCLEAN.

34. Dr. Alan Solomon , personal communication, 1996.

35. Dr. Alan Solomon , "PC Viruses: Detection, Analysis and Cure," Springer Verlag, 1991.

36. Carey Nachenberg and Alex Haddox , "Generic Decryption Scanners: The Problems," Virus Bulletin, August 1996, pp. 6-8.

37. Dr. Frederick B. Cohen , A Short Course on Computer Viruses, Wiley, 2nd Edition, 1994, ISBN: 0471007684.

38. Ronald L. Rivest , "The MD5 Message-Digest Algorithm," RFC 1321, April 1992.

39. Yisrael Radai , "Checksumming Techniques for Anti-Viral Purposes," Virus Bulletin Conference, 1991, pp. 39-68.

40. Dr. Frederick Cohen , "A Note on High-Integrity PC Bootstrapping," Computers & Security, 10, 1991, pp. 535-539.

41. Mikko Hypponen , "Putting Macros Under Control," Virus Bulletin, 1998, pp. 289-300.

42. Vesselin Bontchev , "Possible Virus Attacks Against Integrity Programs and How to Prevent Them," Virus Bulletin Conference, 1992, pp. 131-141.

43. Dr. Frederick Cohen , "Models of Practical Defenses Against Computer Viruses," Computers & Security, 8, 1989, pp. 149-160.

44. Dr. Vesselin Bontchev , personal communication, 2004.

45. Morton Swimmer , "Virus Intrusion Detection Expert System," EICAR, 1995.

46. Costin Raiu , "Suspicious Behaviour: Heuristic Detection of Win32 Backdoors," Virus Bulletin Conference, 1999, pp. 109-124.

    Table of Contents
    Previous Section Next Section