Successivo: About this document
Su: Computer Virus
Precedente: Appendice C: Legislazione Italiana
Riferimenti
- All83
- Eric Allman, ``Sendmail - An Internetwork Mail Router'', University of California, Berkeley, 1983. Issued with the BSD UNIX documentation set.
- AVP
- [http://www.metro.ch/avp-main.html] AVP Antivirus
- Bey90
- P. Beyls, ``Is Unix resistant to computer viruses?,'' Proceedings of the European UNIX systems UserGroup, pp 229-238, M
nich, Germany, April 23-27 1990
- Bro96
- Ralf Brown, Ralf Brown - Interrupt List 49, electronic media, USA, Febbruary 1996, [ralf@pobox.com]
- BSD88
- M. Karels, J. Quatermann, S.J. Leffer, M.K. McKusick, The Design and Implementation of the BSD UNIX Operating System, Addison-Wesley Publishing Company, 1988
- Cas88
- L. Castro et al., ``Procedings of the virus Post-Mortem Meeting'', Baltimore, National Computer Security Center, Ft. George Meade, MD, 8 November 1988.
- CERT
- [http://www.cert.org] - Computer Emergency Response Team
- Ciac1
- [http://ciac.llnl.gov/ciac/SecurityTools.html] U.S. Computer Center Advisor Capability
- Ciac2
- [http://ciac.llnl.gov/ciac/ToolsDOSSystems.html]
- Coh84
- Fred Cohen, ``Computer Viruses: Theory and Experiments,'' Proceedings Of The 7th National Computer Security Conference, pp. 240-263, 1984
- Col88
- J. Collyer, ``Risks of unchecked input in C programs,'' in Forum on Risks to the Public in Computers and Related Systems, vol. 7, No. 74, ACM Committee on Computers and Public Policy, 10 November 1988
- Com88
- Douglas E. Comer, Internetworking with TCP/IP: Principles, Protocols and Architecture, Prentice Hall, Englewood Cliffs, Nj, 1988
- Datafellows
- [http://www.datafellows.com]
- Dow89
- W. F. Dowling, ``There Are No Safe Virus Tests,'' Dept. of Mathematics and Computer Science, Drexel University, Philadelphia, USA, November 1989
- Dr.Solomon
- [http://www.drsolomon.com] Dr. Solomons Antivirus
- EicRoc88
- Mark W. Eichin, Jon A. Rochlis, ``With Microscope and Tweezers: An analysis of the Internet Virus of November 1988,'' Proceedings of the Symposium on Research in Secuirty and Privacy, IEEE-CS, Oakland, CA, may 1989
- Fer93
- G. Ferretti Computer Virus: Aspetti Teorici e Problematiche in Ambienti Standard, Graduation Thesis, Università degli Studi di Salerno - Corso di Laurea in Science dell'Informazione, October 1993
- Ger72
- D. Gerrold, ``When Harlie Was One,'' Ballentine Books, 1972 , the first edition
- GraMor84
- F.T. Grampp and R.H. Morris, ``UNIX Operating System Security,'' in the AT&T Bell Laboratories Technical Journal, October 1984, Vol. 63, No. 8,Part 2,pp. 1649-1672
- Hamburg
- [ftp://ftp.informatik.uni-hamburg.de/pub/virus] University of Hamburg
- Har77
- K. Harrenstein, ``Name/Finger,'' - RFC 742, SRI Network Information Center, December 1977
- HiHaSh83
- R. Hinden, J. Haverty, A. Sheltzer, ``The DARPA Internet: Interconnecting Heterogeneous Computer Networks with Gateways,'' Computer Magazine, vol. 16, No. 9, pp. 38-48, IEEE-CS, September 1983
- Hof96
- P. Hoffman, VSUM Virus Information Summary List, electronic media, March 1996
- Jon95
- L. Joncheray A Simple Active Attack Against TCP Merit Network, Inc. 24 April 1995
- Kas95
- Eugene V. Kaspersky, AVP Virus Encyclopedia, electronic media, Kami Ltd. , Russia, 1995 [eugene@kamis.msk.su]
- Ker88
- J. Steiner, C. Neuman, J. Schiller, ``Kerberos: An Authentication Service for Open Network Systems,'' Usenix Association Winter Conference 1988 Proceedings, pp. 191-202, February 1988
- Moc87
- P. Mockapetris, ``Domain Names - Concepts and Facilities,'' RFC 1034 - 1035 - 1036, Network Working Group, USC ISI, November 1987
- Mor85
- Robert T. Morris, ``A Weakness in the 4.2BSD Unix TCP/IP Software,'' AT&T Bell Laboratories Computing Science Technical Report #117, February 25, 1985
- MorTho78
- Robert Morris and Ken Thompson, ``Password Security: A Case History,'' dated April 3, 1978, in the UNIX Programmer's Manual, and in the Supplementary Documents or the System Manager's Manual, depending on where and when you got your manuals.
- NIST
- [http://www.first.org] - Forum on Incident Response and Security Teams
- Pos82
- Postel, B. Jonathan, ``Simple Mail Transfer Protocol,'' RFC 821, RFC 822, SRI Network Information Center, August 1982
- Purdue
- [ftp://coast.cs.purdue.edu:/pub/doc/morris_worm]
- Rit79
- Dennis M. Ritchie, ``On the Security of UNIX,'' in UNIX Supplementary Documents, AT&T, 1979
- See89
- Donn Seeley, ``A tour of the Worm,'' Proceedings of 1989 Winter Usenix Conference, Usenix Association, San Diego, CA, February 1989
- SKEY
- ``The S/Key One-Time Password System'', Haller, N., Proceeding of the Symposium on Network & Distributed systems, Security, Internet Society, San Diego, CA, February 1994.
- Spa88
- Eugene H. Spafford, ``The Internet Worm Program: An analysis,'' Computer Communication Review, vol. 19, no. 1, ACM SIGCOM, January 1989. Also issued as Purdue Technical CS Report TR-CSD-823
- Spa89
- Eugene H. Spafford, ``The Internet Worm Incident,'' Proceedings of the 1989 European Software Engineering Conference (ESEC 89) Published by Springer-Verlag as #87 in the Lecture Notes in Computer Science also issued as Purdue Technical CS Report TR-CSD-933
- Sto89
- Cliff Stoll, The Cuckoo's Egg, Doubleday, NY, NY, October 1989. Also published in Frankfurt, Germany by Fischer-Verlag
- Tho83
- Ken Thompson, `` Reflections on Trusting Trust,'' 1983 - ACM Turing Award Lecture, in the Communications of the ACM, Vol. 27, No. 8, p. 761, August 1984
- Trend
- [http://www.antivirus.com] - Trend Microdevice
- USC91
- United States Court of Appeals, Document 928 F.2D 504 - Court Statements on Morris' appeal, 7 March 1991
- Wil93
- Dave Williams The Programmer's Technical Reference: MS-DOS, IBM PC & Compatibles, SIGMA PRESS - Marketed by John Wiley & Sons, Ltd.
- 1
- [news:comp.virus]
- 2
- [news:comp.security]
- 3
- [news:comp.protocols.tcp-ip]
- 4
- [news:comp.security.unix]
- 5
- [news:alt.security]
- 6
- [http://www.eff.org] Electronic Frontier Foundation
- 7
- [http://www.viaweb.com/company.html]
Aniello Castiglione e Gerardo Maiorano < anicas,germai@zoo.diaedu.unisa.it >