Computer Viruses: from Theory to Applications

Part I - Genesis and Theory of Computer Viruses Introduction.- The Formalization Foundations.- The Virus Formalization : F. Cohen and L. Adleman (1984 - 1989).- Taxonomy, Techniques and Tools.- The Antiviral Fight Second part - Computer Viruses by Programming Introduction.- Computer Viruses in Interpreted Programming Language.- Companion Viruses Worms Third Part - Computer Viruses and Applications Introduction.- Computer Viruses and Applications.- BIOS Viruses.- Applied Cryptanalysis of Cipher Systems Conclusion Warning about the CDROM Bibliography Index

[1]  Stephen Cole Kleene,et al.  On notation for ordinal numbers , 1938, Journal of Symbolic Logic.

[2]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[3]  Maria M. Pozzo,et al.  An approach to containing computer viruses , 1987, Comput. Secur..

[4]  A. Turing On Computable Numbers, with an Application to the Entscheidungsproblem. , 1937 .

[5]  Leonard M. Adleman,et al.  An Abstract Theory of Computer Viruses , 1988, CRYPTO.

[6]  G. Grätzer,et al.  Lattice Theory: First Concepts and Distributive Lattices , 1971 .

[7]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[8]  Hans Dobbertin Cryptanalysis of MD4 , 1996, FSE.

[9]  Donald F. Towsley,et al.  Code red worm propagation modeling and analysis , 2002, CCS '02.

[10]  Ken Thompson,et al.  Reflections on trusting trust , 1984, CACM.

[11]  Jeffrey D. Ullman,et al.  Introduction to Automata Theory, Languages and Computation , 1979 .

[12]  Xuejia Lai,et al.  A Proposal for a New Block Encryption Standard , 1991, EUROCRYPT.

[13]  Mingtian Zhou,et al.  Some Further Theoretical Results about Computer Viruses , 2004, Comput. J..

[14]  T. Rado On non-computable functions , 1962 .

[15]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[16]  Jr. Hartley Rogers Theory of Recursive Functions and Effective Computability , 1969 .

[17]  Emil L. Post Finite combinatory processes—formulation , 1936, Journal of Symbolic Logic.

[18]  Vern Paxson,et al.  How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.

[19]  David J. Sheskin,et al.  Handbook of Parametric and Nonparametric Statistical Procedures , 1997 .