scispace - formally typeset
Journal ArticleDOI

Computer viruses

Fred Cohen
- 01 Feb 1987 - 
- Vol. 6, Iss: 1, pp 22-35
Reads0
Chats0
TLDR
This paper introduces ''computer viruses'' and examines their potential for causing widespread damage to computer systems and the infeasibility of viral defense in large classes of systems.
About
This article is published in Computers & Security.The article was published on 1987-02-01. It has received 916 citations till now. The article focuses on the topics: System integrity & Computer virus.

read more

Citations
More filters
Journal ArticleDOI

Computer immunology

TL;DR: A body of work on computational immune systems that behave analogously to the natural immune system and in some cases have been used to solve practical engineering problems such as computer security are described.
Book ChapterDOI

Mobile Agents: Are They a Good Idea?

TL;DR: This work considers the advantages offered by mobile agents and assess them against alternate methods of achieving the same function, and concludes that the creation of a pervasive agent framework facilitates a very large number of network services and applications.
Journal ArticleDOI

Watermarking, tamper-proofing, and obfuscation - tools for software protection

TL;DR: Three types of attack on the intellectual property contained in software and three corresponding technical defenses are identified, including obfuscation, watermarking, and tamper-proofing.
Proceedings ArticleDOI

Semantics-aware malware detection

TL;DR: Experimental evaluation demonstrates that the malware-detection algorithm can detect variants of malware with a relatively low run-time overhead and the semantics-aware malware detection algorithm is resilient to common obfuscations used by hackers.
Proceedings Article

Automated worm fingerprinting

TL;DR: The initial experience suggests that, for a wide range of network pathogens, it may be practical to construct fully automated defenses - even against so-called "zero-day" epidemics.
References
More filters
Book

Cryptography and data security

TL;DR: The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to operating systems, database systems, and computer networks.
Journal ArticleDOI

A note on the confinement problem

TL;DR: A set of examples attempts to stake out the boundaries of the problem by defining a program during its execution so that it cannot transmit information to any other program except its caller.

Integrity Considerations for Secure Computer Systems

K. J. Biba
TL;DR: The author identifies the integrity problems posed by a secure military computer utility and integrity policies addressing these problems are developed and their effectiveness evaluated.
Journal ArticleDOI

Protection in operating systems

TL;DR: A model of protection mechanisms in computing systems is presented and its appropriateness is argued and it can be shown that this problem is decidable, i.e. there is an algorithm to determine whether a system in a particular configuration is safe.

Computer Security Technology Planning Study

TL;DR: This document is intended to assist in the management of government procurement operations and will not be used for other purposes other than a definitely related government procurement operation.