next up previous contents
Successivo: About this document Su: Computer Virus Precedente: Appendice C: Legislazione Italiana

Riferimenti

All83
Eric Allman, ``Sendmail - An Internetwork Mail Router'', University of California, Berkeley, 1983. Issued with the BSD UNIX documentation set.
AVP
[http://www.metro.ch/avp-main.html] AVP Antivirus
Bey90
P. Beyls, ``Is Unix resistant to computer viruses?,'' Proceedings of the European UNIX systems UserGroup, pp 229-238, M tex2html_wrap_inline2530 nich, Germany, April 23-27 1990
Bro96
Ralf Brown, Ralf Brown - Interrupt List 49, electronic media, USA, Febbruary 1996, [ralf@pobox.com]
BSD88
M. Karels, J. Quatermann, S.J. Leffer, M.K. McKusick, The Design and Implementation of the BSD UNIX Operating System, Addison-Wesley Publishing Company, 1988
Cas88
L. Castro et al., ``Procedings of the virus Post-Mortem Meeting'', Baltimore, National Computer Security Center, Ft. George Meade, MD, 8 November 1988.
CERT
[http://www.cert.org] - Computer Emergency Response Team
Ciac1
[http://ciac.llnl.gov/ciac/SecurityTools.html] U.S. Computer Center Advisor Capability
Ciac2
[http://ciac.llnl.gov/ciac/ToolsDOSSystems.html]
Coh84
Fred Cohen, ``Computer Viruses: Theory and Experiments,'' Proceedings Of The 7th National Computer Security Conference, pp. 240-263, 1984
Col88
J. Collyer, ``Risks of unchecked input in C programs,'' in Forum on Risks to the Public in Computers and Related Systems, vol. 7, No. 74, ACM Committee on Computers and Public Policy, 10 November 1988
Com88
Douglas E. Comer, Internetworking with TCP/IP: Principles, Protocols and Architecture, Prentice Hall, Englewood Cliffs, Nj, 1988
Datafellows
[http://www.datafellows.com]
Dow89
W. F. Dowling, ``There Are No Safe Virus Tests,'' Dept. of Mathematics and Computer Science, Drexel University, Philadelphia, USA, November 1989
Dr.Solomon
[http://www.drsolomon.com] Dr. Solomons Antivirus
EicRoc88
Mark W. Eichin, Jon A. Rochlis, ``With Microscope and Tweezers: An analysis of the Internet Virus of November 1988,'' Proceedings of the Symposium on Research in Secuirty and Privacy, IEEE-CS, Oakland, CA, may 1989
Fer93
G. Ferretti Computer Virus: Aspetti Teorici e Problematiche in Ambienti Standard, Graduation Thesis, Università degli Studi di Salerno - Corso di Laurea in Science dell'Informazione, October 1993
Ger72
D. Gerrold, ``When Harlie Was One,'' Ballentine Books, 1972 , the first edition
GraMor84
F.T. Grampp and R.H. Morris, ``UNIX Operating System Security,'' in the AT&T Bell Laboratories Technical Journal, October 1984, Vol. 63, No. 8,Part 2,pp. 1649-1672
Hamburg
[ftp://ftp.informatik.uni-hamburg.de/pub/virus] University of Hamburg
Har77
K. Harrenstein, ``Name/Finger,'' - RFC 742, SRI Network Information Center, December 1977
HiHaSh83
R. Hinden, J. Haverty, A. Sheltzer, ``The DARPA Internet: Interconnecting Heterogeneous Computer Networks with Gateways,'' Computer Magazine, vol. 16, No. 9, pp. 38-48, IEEE-CS, September 1983
Hof96
P. Hoffman, VSUM Virus Information Summary List, electronic media, March 1996
Jon95
L. Joncheray A Simple Active Attack Against TCP Merit Network, Inc. 24 April 1995
Kas95
Eugene V. Kaspersky, AVP Virus Encyclopedia, electronic media, Kami Ltd. , Russia, 1995 [eugene@kamis.msk.su]
Ker88
J. Steiner, C. Neuman, J. Schiller, ``Kerberos: An Authentication Service for Open Network Systems,'' Usenix Association Winter Conference 1988 Proceedings, pp. 191-202, February 1988
Moc87
P. Mockapetris, ``Domain Names - Concepts and Facilities,'' RFC 1034 - 1035 - 1036, Network Working Group, USC ISI, November 1987
Mor85
Robert T. Morris, ``A Weakness in the 4.2BSD Unix TCP/IP Software,'' AT&T Bell Laboratories Computing Science Technical Report #117, February 25, 1985
MorTho78
Robert Morris and Ken Thompson, ``Password Security: A Case History,'' dated April 3, 1978, in the UNIX Programmer's Manual, and in the Supplementary Documents or the System Manager's Manual, depending on where and when you got your manuals.
NIST
[http://www.first.org] - Forum on Incident Response and Security Teams
Pos82
Postel, B. Jonathan, ``Simple Mail Transfer Protocol,'' RFC 821, RFC 822, SRI Network Information Center, August 1982
Purdue
[ftp://coast.cs.purdue.edu:/pub/doc/morris_worm]
Rit79
Dennis M. Ritchie, ``On the Security of UNIX,'' in UNIX Supplementary Documents, AT&T, 1979
See89
Donn Seeley, ``A tour of the Worm,'' Proceedings of 1989 Winter Usenix Conference, Usenix Association, San Diego, CA, February 1989
SKEY
``The S/Key One-Time Password System'', Haller, N., Proceeding of the Symposium on Network & Distributed systems, Security, Internet Society, San Diego, CA, February 1994.
Spa88
Eugene H. Spafford, ``The Internet Worm Program: An analysis,'' Computer Communication Review, vol. 19, no. 1, ACM SIGCOM, January 1989. Also issued as Purdue Technical CS Report TR-CSD-823
Spa89
Eugene H. Spafford, ``The Internet Worm Incident,'' Proceedings of the 1989 European Software Engineering Conference (ESEC 89) Published by Springer-Verlag as #87 in the Lecture Notes in Computer Science also issued as Purdue Technical CS Report TR-CSD-933
Sto89
Cliff Stoll, The Cuckoo's Egg, Doubleday, NY, NY, October 1989. Also published in Frankfurt, Germany by Fischer-Verlag
Tho83
Ken Thompson, `` Reflections on Trusting Trust,'' 1983 - ACM Turing Award Lecture, in the Communications of the ACM, Vol. 27, No. 8, p. 761, August 1984
Trend
[http://www.antivirus.com] - Trend Microdevice
USC91
United States Court of Appeals, Document 928 F.2D 504 - Court Statements on Morris' appeal, 7 March 1991
Wil93
Dave Williams The Programmer's Technical Reference: MS-DOS, IBM PC & Compatibles, SIGMA PRESS - Marketed by John Wiley & Sons, Ltd.
1
[news:comp.virus]
2
[news:comp.security]
3
[news:comp.protocols.tcp-ip]
4
[news:comp.security.unix]
5
[news:alt.security]
6
[http://www.eff.org] Electronic Frontier Foundation
7
[http://www.viaweb.com/company.html]


Aniello Castiglione e Gerardo Maiorano < anicas,germai@zoo.diaedu.unisa.it >