On the implications of computer viruses and methods of defense

In this paper, we describe much of the previous and present work on computer viruses. We begin with a short history and bibliographic summary and then describe some of the major issues that arise in the study of computer viruses and in protecting against them. We discuss most of the lines of current research and some of their features and failings. We then introduce a method by which certain classes of systems may be used to provide limited protection from computer viruses and by which general purpose experiments in new protection mechanisms may be explored. Finally, we point out some of the social issues implied by viruses and the ramifications of our present social policies on the integrity of information residing in information systems.

[1]  J. B. Gunn Use of virus functions to provide a virtual APL interpreter under user control , 1984 .

[2]  Butler W. Lampson,et al.  A note on the confinement problem , 1973, CACM.

[3]  C T Dinardo,et al.  Computers and security , 1986 .

[4]  Fred Cohen Designing provably correct information networks with digital diodes , 1988, Comput. Secur..

[5]  P. S. Tasker,et al.  DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA , 1985 .

[6]  Gerald J. Popek,et al.  UCLA Secure UNIX , 1899 .

[7]  B. D. GOLD,et al.  A security retrofit of VM/370 , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[8]  E. J. McCAULEY,et al.  KSOS—The design of a secure operating system* , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[9]  Ken Thompson,et al.  Reflections on trusting trust , 1984, CACM.

[10]  Lewis Bertrand,et al.  S. D. N. , 1936 .

[11]  Fred Cohen A cryptographic checksum for integrity protection , 1987, Comput. Secur..

[12]  A. Kohn [Computer viruses]. , 1989, Harefuah.

[13]  Jeffrey D. Ullman,et al.  Protection in operating systems , 1976, CACM.

[14]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[15]  James P Anderson,et al.  Computer Security Technology Planning Study , 1972 .

[16]  Maria M. Pozzo,et al.  An approach to containing computer viruses , 1987, Comput. Secur..

[17]  A. Turing On Computable Numbers, with an Application to the Entscheidungsproblem. , 1937 .

[18]  D. E. Bell,et al.  Secure Computer Systems : Mathematical Foundations , 2022 .

[19]  Brian Randell,et al.  System structure for software fault tolerance , 1975, IEEE Transactions on Software Engineering.

[20]  Richard R. Linde,et al.  Operating system penetration , 1975, AFIPS '75.

[21]  David A. Bell,et al.  Secure computer systems: mathematical foundations and model , 1973 .

[22]  Liming Chen Improving software reliability by n-version programming. , 1978 .

[23]  A. Tanenbaum Computer recreations , 1973 .

[24]  Fred Cohen,et al.  Design and protection of an information network under a partial ordering: A case study , 1987, Comput. Secur..

[25]  Fred Cohe Protection and administration of information networks with partial orderings , 1987, Comput. Secur..

[26]  E. J. McCauley,et al.  KSOS - The design of a secure operating system , 1899 .

[27]  Carl E. Landwehr The Best Available Technologies for Computer Security , 1983, Computer.

[28]  Fred Cohen A secure computer network design , 1985, Comput. Secur..

[29]  Esther H. Highland Computer systems under siege , 1988 .

[30]  William Hugh Murray,et al.  The application of epidemiology to computer viruses , 1988, Comput. Secur..

[31]  Lance J. Hoffman,et al.  Impacts of information system vulnerabilities on society , 1899, AFIPS '82.

[32]  Fred Cohen,et al.  Two secure file servers , 1988, Comput. Secur..

[33]  John F. Shoch,et al.  The “worm” programs—early experience with a distributed computation , 1982, CACM.

[34]  K J Biba,et al.  Integrity Considerations for Secure Computer Systems , 1977 .

[35]  Fred Cohen,et al.  Design and administration of distributed and hierarchical information networks under partial orderings , 1987, Comput. Secur..

[36]  S. Yau,et al.  Design of self-checking software , 1975, Reliable Software.