Journal ArticleDOI
Computer viruses
Reads0
Chats0
TLDR
This paper introduces ''computer viruses'' and examines their potential for causing widespread damage to computer systems and the infeasibility of viral defense in large classes of systems.About:
This article is published in Computers & Security.The article was published on 1987-02-01. It has received 916 citations till now. The article focuses on the topics: System integrity & Computer virus.read more
Citations
More filters
Journal ArticleDOI
Computer immunology
TL;DR: A body of work on computational immune systems that behave analogously to the natural immune system and in some cases have been used to solve practical engineering problems such as computer security are described.
Book ChapterDOI
Mobile Agents: Are They a Good Idea?
TL;DR: This work considers the advantages offered by mobile agents and assess them against alternate methods of achieving the same function, and concludes that the creation of a pervasive agent framework facilitates a very large number of network services and applications.
Journal ArticleDOI
Watermarking, tamper-proofing, and obfuscation - tools for software protection
TL;DR: Three types of attack on the intellectual property contained in software and three corresponding technical defenses are identified, including obfuscation, watermarking, and tamper-proofing.
Proceedings ArticleDOI
Semantics-aware malware detection
TL;DR: Experimental evaluation demonstrates that the malware-detection algorithm can detect variants of malware with a relatively low run-time overhead and the semantics-aware malware detection algorithm is resilient to common obfuscations used by hackers.
Proceedings Article
Automated worm fingerprinting
TL;DR: The initial experience suggests that, for a wide range of network pathogens, it may be practical to construct fully automated defenses - even against so-called "zero-day" epidemics.
References
More filters
Book
Cryptography and data security
TL;DR: The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to operating systems, database systems, and computer networks.
Journal ArticleDOI
A note on the confinement problem
TL;DR: A set of examples attempts to stake out the boundaries of the problem by defining a program during its execution so that it cannot transmit information to any other program except its caller.
Integrity Considerations for Secure Computer Systems
TL;DR: The author identifies the integrity problems posed by a secure military computer utility and integrity policies addressing these problems are developed and their effectiveness evaluated.
Journal ArticleDOI
Protection in operating systems
TL;DR: A model of protection mechanisms in computing systems is presented and its appropriateness is argued and it can be shown that this problem is decidable, i.e. there is an algorithm to determine whether a system in a particular configuration is safe.
Computer Security Technology Planning Study
TL;DR: This document is intended to assist in the management of government procurement operations and will not be used for other purposes other than a definitely related government procurement operation.