Zusammenfassung
In diesem Abschnitt will ich einige technische Zusammenhänge erläutern, die zum Verstehen der Funktionsweise von Computerviren nötig sind.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Weiterführende und allgemeine Literatur
Virus L Digest Files 1991, 1992 & 1993
Virus L Digest Frequently Asked Questions File 6/1992
Malte Eppert Frequently Asked Questions der FidoNet-Echo-Area VIRUS.GER 8/1992
Robert M. Slade Antiviral Checklist erschienen 1992 in den Virus L Digest Files
Steve R. White & David M. Chess Coping with Computer Viruses and Related Problems Research Report IBM, Thomas J. Watson Research Center 1989
David Ferbrache A Pathology of Computer Viruses Springer Verlag 1992
Vesselin Bontchev The Bulgarian and Soviet Virus Factories Laboratory of Computer Virology, Bulgarian Academy of Sciences
Christopher V. Feudo The Computer Virus Desk Reference 1992 Edition Business One Irwin
Jan Hruska Computer Viruses and Anti-Virus Warfare Simon & Schuster International Group
Allan Lundell Zeitbombe Computervirus Wunderlich 1990
Fred Cohen Computer Viruses: Theory and Experiment in Computers & Security 6/1987 Seite 22 – 35
Fred Cohen On the Implications of Computer Viruses and Methods of Defense in Computer & Security 7/1988 Seite 167–184
W.H. Murray Security Considerations for Personal Computers in IBM System Journal Vol. 23 Nr. 3/1984
-- Security, Auditability, System Control Publications Bibliography IBM 1987
-- An Executive Guide to Data Security IBM 1975
-- Good Security Practices for Information Systems Networks IBM 1987
-- Security Risk Assessment in Electronic Data Processing Systems IBM 1984
Verschiedene Autoren Das Chaos Computer Buch Rowohlt Verlag 1988
Hans H. Gerhardt & Heinrich Göbel PC- / MS - DOS für Insider Markt & Technik Verlag 1988
Harald Milz Verstohlene Seitenblicke Der Interrupt 21h beim DOS Bootvorgang c’t 7/1992 Seite 198 ff
Jörg Schieb Das DOS 5.0 Buch Sybex Verlag 1992
Hans H. Gerhardt DOS 3.3 für PC’s und Personal System /2 Markt & Technik Verlag 1988
Philip M. Adams & Clovis L. Tondo Writing DOS Device Drivers in C Prentice Hall, Englewood Cliffs 1990
-- MS-DOS 5.0 Handbuch für Programmierer Microsoft Press 1991
Arne Schärpers DOS 5 für Programmierer Addison Wesley 1991
Andrew Schulman Undocumented DOS Addison Wesley 1990
Shoch J., Hupp J. The Worm Programs - Early Experience woth a Distributed Computation CACM, vol 25, 3, March 1982, pp. 172–180
Adleman L. An Abstract Theory of Computer Viruses Fred Cohen Models of Practical Defenses Against Computer Viruses Computers & Security, vol. 8 (1989), 2, pp. 149–160
Fred Cohen Computational Aspects of Computer Viruses Computers & Security, vol. 8 (1989), 4, pp. 325–344
Dowling W. There Are No Safe Virus Tests The American Mathematical Monthly, vol. 96, 9, Nov. 1989, pp. 835–836
Dowling W. Computer Viruses: Diagonalization and Fixed Points Notices of the American Mathematical Society, vol. 37 (1990), 7, pp. 858–861
Lai N., Gray T. Strengthening Discretionary Access Controls to Inhibit Trojan Horses and Computer Viruses proc. of USENIX′88, pp. 275–286
Joseph M., Avizienis A. A Fault Tolerance Approach to Computer Viruses
Pozzo M., Gray T. An Approach to Containing Computer Viruses Computers & Security, vol. 6 (1987), pp. 321–331
Murray W. The Application of Epidemiology to Computer Viruses Computers & Security, vol. 7 (1988), 2, pp. 139–150
Wiseman S. Preventing Viruses in Computer Systems Computers & Security, vol. 8 (1989), 5, pp. 427–432
Jones S., White C. The IPM Model of Computer Virus Management”, Computers & Security, vol. 9 (1990), 5, pp. 411–418
Gleissner W. A Mathematical Theory for the Spread of Computer Viruses Computers & Security, vol. 8 (1989), 1, pp. 35–41
David Ferbrache Trojan Horse Techniques to Compromise Sensitive or Classified Data Virus Bulletin, September 1990, pp. 11–14.
Rob Rosenberger & Ross Greenberg Computer Virus Myths 1988
-- Trusted Computersystem evaluation criteria ( Orange Book ) DoD, US Department of Defense, 1985
-- Password management guideline ( Green Book ) DoD, US Department of Defense, 1985
John P. Wack & Lisa J. Carnahan Computer Viruses and Related Threats: A Management Guide
Brenner, Aaron LAN Security LAN Magazine, Aug 1989.
Deloitte, Haskins, & Sells Computer Viruses - Proceedings of an Invitational Symposium Oct 10/11, 1988
Dvorak, John Virus Wars: A Serious Warning PC Magazine; Feb 29, 1988.
Federal Information Processing Standards Publication 83 Guideline on User Authentication Techniques for Computer Network Access Control National Bureau of Standards, Sept, 1980.
Federal Information Processing Standards Publication 85 Guidelines for ADP Contingency Planning National Bureau of Standards, March, 1981.
Fiedler, David and Hunter, Bruce M. Unix System Administration Hayden Books, 1987
Fitzgerald, Jerry Business Data Communications: Basic Concepts, Security, and Design John Wiley and Sons, Inc., 1984
Gasser, Morrie Building a Secure Computer System Van Nostrand Reinhold, New York, 1988
Grampp, F. T. and Morris, R. H. UNIX Operating System Security AT&T Bell Laboratories Technical Journal, Oct 1984.
Highland, Harold J. From the Editor -- Computer Viruses Computers & Security; Aug 1987.
Longley, Dennis and Shain, Michael Data and Computer Security
NBS Special Publication 500-120 Security of Personal Computer Systems: A Management Guide National Bureau of Standards, Jan 1985.
Parker, T. Public domain software review: Trojans revisited, CROBOTS, and ATC Computer Language; April 1987.
Schnaidt, Patricia Fasten Your Safety Belt LAN Magazine, Oct 1987.
William Gibson Neuromancer Heyne, 1987 ACHTUNG ! Kein Fachbuch sondern ein Science Fiction Roman.
Eugene H. Spafford The InterNet Worm Program: An Analysis Purdue Technical Report CSD-TR-823, 1988
B. Clifford Neuman & Jennifer G. Steiner Authentication of Unknown Entities on an Insecure Network of Untrusted Workstations Massachusetts Institute of Technologie
Matt Bishop An Overview of Computer Viruses in a Research Environment Department of Mathematics and Computer Science, Dartmouth College
Dr. Thomas Wille Verschlüsselungssysteme; Keine Chance für Datenpiraten Funkschau, 12/92 Seite 70 ff
Peter C. Wayner Using Content-Addressable Search Engines to Encrypt and Break DES Computer Science Department, Cornell University
Donn Seeley A Tour of the Worm Department of Computer Science, University of Utah
David M. Chess Virus Verification and Removal Tools and Techniques IBM, Thomas J. Watson Research Center 1991
G. Al-Dossary Computer Virus Prevention and Containment on Mainframes Computers and Security April 1990 Seite 131–137
J. Brunner The Shockwave Rider Ballantine, 1975 ACHTUNG ! Kein Fachbuch sondern ein Science Fiction Roman.
Rudolf Schief Einführung in die Mikroprozessoren und Mikrocomputer Attempo Verlag, 1991
H. Tornsdorf & M. Tornsdorf Das große Personal Computer Buch Data Becker, 1991
Microsoft’s DOS 6.0 beta due this month; will include antivirus software. PC Week, August 3, 1992 v9 n31 p4(l).
An ounce of prevention.… Computer Shopper, August 1992 vl2 n8 p849(1).
Jürgen Loga Datensicherheit BHV Verlag
Diethard Erbslöh Sicherheit rund um den PC Taylorix Fachverlag
Martin Hofmann Viren erkennen und beseitigen Falken Verlag
Martin R. Smith Commonsense Computer Security Mc Graw-Hill
Jan Hruska & Keith Jackson Computer Security Solutions Blackwell Scientific Publications
H. Kersten Einführung in die Computersicherheit Oldenbourg Verlag
Neil Postman Das Technopol S. Fischer Verlag
Dr. Alan Solomon Dr. Solomon’s Virus Encyclopaedia S&S International
Niels Bjergstrøm & Righard Zwienenberg CSE News Letter Oktober 92 - März 93 Computer Security Engineers
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1993 Friedr. Vieweg & Sohn Verlagsgesellschaft mbH, Braunschweig/Wiesbaden
About this chapter
Cite this chapter
Fuhs, H. (1993). Anhang. In: Computerviren und ihre Vermeidung. Vieweg+Teubner Verlag. https://doi.org/10.1007/978-3-322-84213-8_12
Download citation
DOI: https://doi.org/10.1007/978-3-322-84213-8_12
Publisher Name: Vieweg+Teubner Verlag
Print ISBN: 978-3-528-05319-2
Online ISBN: 978-3-322-84213-8
eBook Packages: Springer Book Archive