Skip to main content

Anhang

  • Chapter
  • 84 Accesses

Zusammenfassung

In diesem Abschnitt will ich einige technische Zusammenhänge erläutern, die zum Verstehen der Funktionsweise von Computerviren nötig sind.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Weiterführende und allgemeine Literatur

  • Virus L Digest Files 1991, 1992 & 1993

    Google Scholar 

  • Virus L Digest Frequently Asked Questions File 6/1992

    Google Scholar 

  • Malte Eppert Frequently Asked Questions der FidoNet-Echo-Area VIRUS.GER 8/1992

    Google Scholar 

  • Robert M. Slade Antiviral Checklist erschienen 1992 in den Virus L Digest Files

    Google Scholar 

  • Steve R. White & David M. Chess Coping with Computer Viruses and Related Problems Research Report IBM, Thomas J. Watson Research Center 1989

    Google Scholar 

  • David Ferbrache A Pathology of Computer Viruses Springer Verlag 1992

    Book  Google Scholar 

  • Vesselin Bontchev The Bulgarian and Soviet Virus Factories Laboratory of Computer Virology, Bulgarian Academy of Sciences

    Google Scholar 

  • Christopher V. Feudo The Computer Virus Desk Reference 1992 Edition Business One Irwin

    Google Scholar 

  • Jan Hruska Computer Viruses and Anti-Virus Warfare Simon & Schuster International Group

    Google Scholar 

  • Allan Lundell Zeitbombe Computervirus Wunderlich 1990

    Google Scholar 

  • Fred Cohen Computer Viruses: Theory and Experiment in Computers & Security 6/1987 Seite 22 – 35

    Article  Google Scholar 

  • Fred Cohen On the Implications of Computer Viruses and Methods of Defense in Computer & Security 7/1988 Seite 167–184

    Article  Google Scholar 

  • W.H. Murray Security Considerations for Personal Computers in IBM System Journal Vol. 23 Nr. 3/1984

    Google Scholar 

  • -- Security, Auditability, System Control Publications Bibliography IBM 1987

    Google Scholar 

  • -- An Executive Guide to Data Security IBM 1975

    Google Scholar 

  • -- Good Security Practices for Information Systems Networks IBM 1987

    Google Scholar 

  • -- Security Risk Assessment in Electronic Data Processing Systems IBM 1984

    Google Scholar 

  • Verschiedene Autoren Das Chaos Computer Buch Rowohlt Verlag 1988

    Google Scholar 

  • Hans H. Gerhardt & Heinrich Göbel PC- / MS - DOS für Insider Markt & Technik Verlag 1988

    Google Scholar 

  • Harald Milz Verstohlene Seitenblicke Der Interrupt 21h beim DOS Bootvorgang c’t 7/1992 Seite 198 ff

    Google Scholar 

  • Jörg Schieb Das DOS 5.0 Buch Sybex Verlag 1992

    Google Scholar 

  • Hans H. Gerhardt DOS 3.3 für PC’s und Personal System /2 Markt & Technik Verlag 1988

    Google Scholar 

  • Philip M. Adams & Clovis L. Tondo Writing DOS Device Drivers in C Prentice Hall, Englewood Cliffs 1990

    Google Scholar 

  • -- MS-DOS 5.0 Handbuch für Programmierer Microsoft Press 1991

    Google Scholar 

  • Arne Schärpers DOS 5 für Programmierer Addison Wesley 1991

    Google Scholar 

  • Andrew Schulman Undocumented DOS Addison Wesley 1990

    Google Scholar 

  • Shoch J., Hupp J. The Worm Programs - Early Experience woth a Distributed Computation CACM, vol 25, 3, March 1982, pp. 172–180

    Google Scholar 

  • Adleman L. An Abstract Theory of Computer Viruses Fred Cohen Models of Practical Defenses Against Computer Viruses Computers & Security, vol. 8 (1989), 2, pp. 149–160

    Google Scholar 

  • Fred Cohen Computational Aspects of Computer Viruses Computers & Security, vol. 8 (1989), 4, pp. 325–344

    Article  Google Scholar 

  • Dowling W. There Are No Safe Virus Tests The American Mathematical Monthly, vol. 96, 9, Nov. 1989, pp. 835–836

    Article  MathSciNet  Google Scholar 

  • Dowling W. Computer Viruses: Diagonalization and Fixed Points Notices of the American Mathematical Society, vol. 37 (1990), 7, pp. 858–861

    Google Scholar 

  • Lai N., Gray T. Strengthening Discretionary Access Controls to Inhibit Trojan Horses and Computer Viruses proc. of USENIX′88, pp. 275–286

    Google Scholar 

  • Joseph M., Avizienis A. A Fault Tolerance Approach to Computer Viruses

    Google Scholar 

  • Pozzo M., Gray T. An Approach to Containing Computer Viruses Computers & Security, vol. 6 (1987), pp. 321–331

    Article  Google Scholar 

  • Murray W. The Application of Epidemiology to Computer Viruses Computers & Security, vol. 7 (1988), 2, pp. 139–150

    Article  Google Scholar 

  • Wiseman S. Preventing Viruses in Computer Systems Computers & Security, vol. 8 (1989), 5, pp. 427–432

    Article  Google Scholar 

  • Jones S., White C. The IPM Model of Computer Virus Management”, Computers & Security, vol. 9 (1990), 5, pp. 411–418

    Article  Google Scholar 

  • Gleissner W. A Mathematical Theory for the Spread of Computer Viruses Computers & Security, vol. 8 (1989), 1, pp. 35–41

    Article  Google Scholar 

  • David Ferbrache Trojan Horse Techniques to Compromise Sensitive or Classified Data Virus Bulletin, September 1990, pp. 11–14.

    Google Scholar 

  • Rob Rosenberger & Ross Greenberg Computer Virus Myths 1988

    Google Scholar 

  • -- Trusted Computersystem evaluation criteria ( Orange Book ) DoD, US Department of Defense, 1985

    Google Scholar 

  • -- Password management guideline ( Green Book ) DoD, US Department of Defense, 1985

    Google Scholar 

  • John P. Wack & Lisa J. Carnahan Computer Viruses and Related Threats: A Management Guide

    Google Scholar 

  • Brenner, Aaron LAN Security LAN Magazine, Aug 1989.

    Google Scholar 

  • Deloitte, Haskins, & Sells Computer Viruses - Proceedings of an Invitational Symposium Oct 10/11, 1988

    Google Scholar 

  • Dvorak, John Virus Wars: A Serious Warning PC Magazine; Feb 29, 1988.

    Google Scholar 

  • Federal Information Processing Standards Publication 83 Guideline on User Authentication Techniques for Computer Network Access Control National Bureau of Standards, Sept, 1980.

    Google Scholar 

  • Federal Information Processing Standards Publication 85 Guidelines for ADP Contingency Planning National Bureau of Standards, March, 1981.

    Google Scholar 

  • Fiedler, David and Hunter, Bruce M. Unix System Administration Hayden Books, 1987

    Google Scholar 

  • Fitzgerald, Jerry Business Data Communications: Basic Concepts, Security, and Design John Wiley and Sons, Inc., 1984

    Google Scholar 

  • Gasser, Morrie Building a Secure Computer System Van Nostrand Reinhold, New York, 1988

    Google Scholar 

  • Grampp, F. T. and Morris, R. H. UNIX Operating System Security AT&T Bell Laboratories Technical Journal, Oct 1984.

    Google Scholar 

  • Highland, Harold J. From the Editor -- Computer Viruses Computers & Security; Aug 1987.

    Google Scholar 

  • Longley, Dennis and Shain, Michael Data and Computer Security

    Google Scholar 

  • NBS Special Publication 500-120 Security of Personal Computer Systems: A Management Guide National Bureau of Standards, Jan 1985.

    Google Scholar 

  • Parker, T. Public domain software review: Trojans revisited, CROBOTS, and ATC Computer Language; April 1987.

    Google Scholar 

  • Schnaidt, Patricia Fasten Your Safety Belt LAN Magazine, Oct 1987.

    Google Scholar 

  • William Gibson Neuromancer Heyne, 1987 ACHTUNG ! Kein Fachbuch sondern ein Science Fiction Roman.

    Google Scholar 

  • Eugene H. Spafford The InterNet Worm Program: An Analysis Purdue Technical Report CSD-TR-823, 1988

    Google Scholar 

  • B. Clifford Neuman & Jennifer G. Steiner Authentication of Unknown Entities on an Insecure Network of Untrusted Workstations Massachusetts Institute of Technologie

    Google Scholar 

  • Matt Bishop An Overview of Computer Viruses in a Research Environment Department of Mathematics and Computer Science, Dartmouth College

    Google Scholar 

  • Dr. Thomas Wille Verschlüsselungssysteme; Keine Chance für Datenpiraten Funkschau, 12/92 Seite 70 ff

    Google Scholar 

  • Peter C. Wayner Using Content-Addressable Search Engines to Encrypt and Break DES Computer Science Department, Cornell University

    Google Scholar 

  • Donn Seeley A Tour of the Worm Department of Computer Science, University of Utah

    Google Scholar 

  • David M. Chess Virus Verification and Removal Tools and Techniques IBM, Thomas J. Watson Research Center 1991

    Google Scholar 

  • G. Al-Dossary Computer Virus Prevention and Containment on Mainframes Computers and Security April 1990 Seite 131–137

    Google Scholar 

  • J. Brunner The Shockwave Rider Ballantine, 1975 ACHTUNG ! Kein Fachbuch sondern ein Science Fiction Roman.

    Google Scholar 

  • Rudolf Schief Einführung in die Mikroprozessoren und Mikrocomputer Attempo Verlag, 1991

    Google Scholar 

  • H. Tornsdorf & M. Tornsdorf Das große Personal Computer Buch Data Becker, 1991

    Google Scholar 

  • Microsoft’s DOS 6.0 beta due this month; will include antivirus software. PC Week, August 3, 1992 v9 n31 p4(l).

    Google Scholar 

  • An ounce of prevention.… Computer Shopper, August 1992 vl2 n8 p849(1).

    Google Scholar 

  • Jürgen Loga Datensicherheit BHV Verlag

    Google Scholar 

  • Diethard Erbslöh Sicherheit rund um den PC Taylorix Fachverlag

    Google Scholar 

  • Martin Hofmann Viren erkennen und beseitigen Falken Verlag

    Google Scholar 

  • Martin R. Smith Commonsense Computer Security Mc Graw-Hill

    Google Scholar 

  • Jan Hruska & Keith Jackson Computer Security Solutions Blackwell Scientific Publications

    Google Scholar 

  • H. Kersten Einführung in die Computersicherheit Oldenbourg Verlag

    Google Scholar 

  • Neil Postman Das Technopol S. Fischer Verlag

    Google Scholar 

  • Dr. Alan Solomon Dr. Solomon’s Virus Encyclopaedia S&S International

    Google Scholar 

  • Niels Bjergstrøm & Righard Zwienenberg CSE News Letter Oktober 92 - März 93 Computer Security Engineers

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1993 Friedr. Vieweg & Sohn Verlagsgesellschaft mbH, Braunschweig/Wiesbaden

About this chapter

Cite this chapter

Fuhs, H. (1993). Anhang. In: Computerviren und ihre Vermeidung. Vieweg+Teubner Verlag. https://doi.org/10.1007/978-3-322-84213-8_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-322-84213-8_12

  • Publisher Name: Vieweg+Teubner Verlag

  • Print ISBN: 978-3-528-05319-2

  • Online ISBN: 978-3-322-84213-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics