Computer viruses: Theory and experiments

@article{Cohen1987ComputerVT,
  title={Computer viruses: Theory and experiments},
  author={F. Cohen},
  journal={Comput. Secur.},
  year={1987},
  volume={6},
  pages={22-35}
}
  • F. Cohen
  • Published 1987
  • Computer Science
  • Comput. Secur.
  • This paper introduces ''computer viruses'' and examines their potential for causing widespread damage to computer systems. Basic theoretical results are presented, and the infeasibility of viral defense in large classes of systems is shown. Defensive schemes are presented and several experiments are described. 
    815 Citations
    An Abstract Theory of Computer Viruses
    • 144
    • PDF
    The application of epidemiology to computer viruses
    • 148
    • PDF
    A cost analysis of typical computer viruses and defenses
    • 19
    • PDF
    Preventing viruses in computer systems
    • 4
    Computational aspects of computer viruses
    • F. Cohen
    • Computer Science
    • Comput. Secur.
    • 1989
    • 116
    • PDF
    Computer virology and aids
    • D. Shaw
    • Computer Science
    • Proceedings. International Carnahan Conference on Security Technology
    • 1989
    • 2
    Current best practice against computer viruses
    • F. Cohen
    • Computer Science
    • Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on Security Technology
    • 1991
    • 5
    Models of practical defenses against computer viruses
    • F. Cohen
    • Computer Science
    • Comput. Secur.
    • 1989
    • 48
    • PDF

    References

    SHOWING 1-10 OF 40 REFERENCES
    Integrity Considerations for Secure Computer Systems
    • 573
    Applications for multilevel secure operating systems
    • J. P. Woodward
    • Computer Science
    • 1979 International Workshop on Managing Requirements Knowledge (MARK)
    • 1979
    • 38
    • PDF
    KSOS—The design of a secure operating system*
    • 41
    Protection in operating systems
    • 1,196
    • PDF
    Impacts of information system vulnerabilities on society
    • 13
    • PDF
    The Best Available Technologies for Computer Security
    • 65
    Cryptography and Data Security
    • 1,906
    KSOS - The design of a secure operating system
    • 62
    • PDF
    UCLA Secure Unix*
    • 40