A Pathology of Computer Viruses

A Pathology of Computer Viruses

Que Corporation, 1989 (ISBN 0-88022-458-4) IBM PC Virus Protection and Precautions Steve White, David Chess, Coping with computer viruses and related problems. IBM Thomas J. Watson Research Centre, research report RC 14405, January 1989 ...

Author: David Ferbrache

Publisher: Springer Science & Business Media

ISBN: 9781447117742

Category: Computers

Page: 306

View: 808

The 1980's saw the advent of widespread (and potentially damaging) computer virus infection of both personal computer and mainframe systems. The computer security field has been comparatively slow to react to this emerging situation. It is only over the last two years that a significant body of knowledge on the operation, likely evolution and prevention of computer viruses has developed. A Pathology of Computer Viruses gives a detailed overview of the history of the computer virus and an in-depth technical review of the principles of computer virus and worm operation under DOS, Mac, UNIX and DEC operating systems. David Ferbrache considers the possible extension of the threat to the mainframe systems environment and suggests how the threat can be effectively combatted using an antiviral management plan. The author addresses the latest developments in "stealth" virus operations, specifically the trend for virus authors to adopt extensive camouflage and concealment techniques, which allow viruses to evade both existing anti-viral software and to avoid detection by direct observation of machine behaviour. A Pathology of Computer Viruses addresses a distinct need - that of the computer specialist and professional who needs a source reference work detailing all aspects of the computer virus threat.
Categories: Computers

Guide to Computer Viruses

Guide to Computer Viruses

of the cyberpunk, Denning's collection of essays is important not only for the concerned computer user, ... Pathology. of. Computer. Viruses,. David. Ferbrache. (1992). ISBN 0-387–19610-2 ($49,00) Springer-Verlag 175 Fifth Avenue New ...

Author: Robert Slade

Publisher: Springer

ISBN: 9781461223849

Category: Computers

Page: 422

View: 430

For those who didn't buy the first edition, welcome aboard. For those who did buy the first edition, welcome back, and thanks for making the second edition possible. For those who bought the first edition and are standing in the book store wondering whether to buy the second, what's in it for you? Well, for one thing, it's smaller. (No, no! Don't leave!) I tried to make the first edition a kind of master reference for antiviral protection. That meant I included a lot of stuff that I thought might possibly be helpful, even if I had some doubts about it. This time I've tried to be a little more selective. I've added a little more material to Chapter 4 (Computer Opera tions and Viral Operations) dealing with the question of computer vi ruses infecting data files and the new "macro" viruses. I've added two new sections to Chapter 7 (The Virus and Society). One looks at the increasing problem of false alarms while the other looks at the ethics of virus writing and exchange.
Categories: Computers

Computer Viruses and Malware

Computer Viruses and Malware

H. Etoh. Stack protection schemes: (propolice, StackGuard, XP SP2). PacSec/core()4 Conference, 2004. D. Ferbrache. A Pathology of Computer Viruses. Springer-Verlag, 1992. P. Ferrie and F. Perriot. Detecting complex viruses.

Author: John Aycock

Publisher: Springer Science & Business Media

ISBN: 9780387341880

Category: Computers

Page: 228

View: 869

Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare. Computer Viruses and Malware is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for advanced-level students in computer science.
Categories: Computers

The Art of Computer Virus Research and Defense

The Art of Computer Virus Research and Defense

Dr. Klaus Brunnstein, “Computer 'Beastware': Trojan Horses, Viruses, Worms—A Survey,” HISEC'93, 1993. 36. David Ferbrache, “A Pathology of Computer Viruses,” SpringerVerlag, 1992, ISBN: 3540196102. 37.

Author: Peter Szor

Publisher: Pearson Education

ISBN: 9780672333903

Category: Computers

Page: 744

View: 217

Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more. Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats. Szor also offers the most thorough and practical primer on virus analysis ever published—addressing everything from creating your own personal laboratory to automating the analysis process. This book's coverage includes Discovering how malicious code attacks on a variety of platforms Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more Identifying and responding to code obfuscation threats: encrypted, polymorphic, and metamorphic Mastering empirical methods for analyzing malicious code—and what to do with what you learn Reverse-engineering malicious code with disassemblers, debuggers, emulators, and virtual machines Implementing technical defenses: scanning, code emulation, disinfection, inoculation, integrity checking, sandboxing, honeypots, behavior blocking, and much more Using worm blocking, host-based intrusion prevention, and network-level defense strategies
Categories: Computers

Computer Science and Engineering

Computer Science and Engineering

[This refined Cohen's results and proved the generic virus detection problem undecidable]. ... [This collection of papers discusses aspects of computer viruses and related programs]. Duff T. (1989). ... A Pathology of Computer Viruses.

Author: Zainalabedin Navabi

Publisher: EOLSS Publications

ISBN: 9781848262270

Category: Computers

Page: 388

View: 237

Computer Science and Engineering is a component of Encyclopedia of Technology, Information, and Systems Management Resources in the global Encyclopedia of Life Support Systems (EOLSS), which is an integrated compendium of twenty one Encyclopedias. The Theme on Computer Science and Engineering provides the essential aspects and fundamentals of Hardware Architectures, Software Architectures, Algorithms and Data Structures, Programming Languages and Computer Security. It is aimed at the following five major target audiences: University and College students Educators, Professional practitioners, Research personnel and Policy analysts, managers, and decision makers.
Categories: Computers

Security and Software for Cybercafes

Security and Software for Cybercafes

Viruses. (n.d.). Virus Encyclopedia. Retrieved March 24, 2007, from http://www.viruslist.com/ en/viruses/encyclopedia Ferbrache, D. (1992). A pathology of computer viruses. London; New York: Springer-Verlag. Virus-like attack hits web ...

Author: Adomi, Esharenana E.

Publisher: IGI Global

ISBN: 9781599049052

Category: Computers

Page: 360

View: 433

Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are traveling, to access Web mail and instant messages, read newspapers, and explore other resources of the Internet. Due to the important role Internet cafes play in facilitating access to information, there is a need for their systems to have well-installed software in order to ensure smooth service delivery. Security and Software for Cybercafes provides relevant theoretical frameworks and current empirical research findings on the security measures and software necessary for cybercafes, offering information technology professionals, scholars, researchers, and educators detailed knowledge and understanding of this innovative and leading-edge issue, both in industrialized and developing countries.
Categories: Computers

Information Security Management Handbook Volume 4

Information Security Management Handbook  Volume 4

Cohen, Fred, 1994, A Short Course on Computer Viruses, 2nd ed., Wiley, New York. 2. Ferbrache, David, 1992, A Pathology of Computer Viruses, Springer-Verlag, London. 3. Gattiker, Urs, Harley, David, and Slade, Robert, 2001, ...

Author: Harold F. Tipton

Publisher: CRC Press

ISBN: 9781420072419

Category: Business & Economics

Page: 1018

View: 843

The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion
Categories: Business & Economics

The Internet Encyclopedia

The Internet Encyclopedia

The term properly refers to the technology , and not a particular virus . ... Virus " A program which modifies other programs to contain a possibly altered version of itself " ( attributed to Dr. ... A pathology of computer viruses .

Author: Hossein Bidgoli

Publisher: John Wiley & Sons

ISBN: 0471222046

Category: Computers

Page: 884

View: 660

Publisher Description
Categories: Computers

Elements of Computer Security

Elements of Computer Security

A Short Course on Computer Viruses, (2nd ed.), Frederick B. Cohen, New York, NY, John Wiley, 1994. PC Security and Virus Protection Handbook, Pamela Kane, M&T Books, 1994. A Pathology of Computer Viruses, David Ferbrache, ...

Author: David Salomon

Publisher: Springer Science & Business Media

ISBN: 9780857290069

Category: Computers

Page: 375

View: 788

As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future. Developed from the author's successful Springer guide to Foundations of Computer Security, this accessible textbook/reference is fully updated and enhanced with resources for students and tutors. Topics and features: examines the physical security of computer hardware, networks, and digital data; introduces the different forms of rogue software (or malware), discusses methods for preventing and defending against malware, and describes a selection of viruses, worms and Trojans in detail; investigates the important threats to network security, and explores the subjects of authentication, spyware, and identity theft; discusses issues of privacy and trust in the online world, including children's privacy and safety; includes appendices which discuss the definition, meaning, and history of the term hacker, introduce the language of "l33t Speak", and provide a detailed virus timeline; provides numerous exercises and examples throughout the text, in addition to a Glossary of terms used in the book; supplies additional resources at the associated website, http://www.DavidSalomon.name/, including an introduction to cryptography, and answers to the exercises. Clearly and engagingly written, this concise textbook is an ideal resource for undergraduate classes on computer security. The book is mostly non-mathematical, and is suitable for anyone familiar with the basic concepts of computers and computations.
Categories: Computers