💾 Archived View for spam.works › mirrors › textfiles › virus › readlist.vir captured on 2023-06-16 at 21:04:16.
-=-=-=-=-=-=-
An Abbreviated Bibliography for Computer Viruses and Related Security Issues Revised April 18, 1990 NIST The National Institute of Standards and Technology ABSTRACT This document provides a list of suggested readings about computer viruses and other related threats to computer security. The primary intended audience is management and those who need access to the basic facts, however readings are included that are also suitable for technically-oriented individuals who wish to learn more about the nature of computer viruses and techniques that can be used to reduce their potential threat. The suggested readings range from general discus- sions on the nature of viruses and related threats, to technical articles which explore the details of various viruses, the mechan- isms they attack, and methods for controlling these threats to computer security. Other articles are included that deal with more general aspects of computer security, but which have some bearing on the problem. The National Institute of Standards and Technology The National Institute of Standards and Tech- nology (NIST) has responsibility within the Federal Government for computer science and technology activities. The programs of the NIST National Computer Systems Laboratory (NCSL) are designed to provide ADP standards, guidelines, and technical advisory services to improve the effectiveness of computer utilization and security, and to perform appropriate research and development efforts as foundation for such activities and prog- rams. Copies of this paper as well as other publications may be obtained from the follow- ing address: National Institute of Standards and Technology Computer Security Management and Evaluation Group Computer Security Division A216, Technology Gaithersburg, MD 20899 BASIC TERMS The following list provides general definitions for basic terms used throughout the literature. Some of the terms are relatively new and their definitions are not widely agreed upon, thus they may be used differently elsewhere. Computer Virus: A name for software written to cause some form(s) of damage to a comput- ing system. Computer viruses copy their instructions to other programs; the other pro- grams may continue to copy the instructions to more programs. Depending on the author's mo- tives, the instructions may cause many different forms of damage, such as deleting files or crashing the system. Com- puter viruses are so named be- cause of their functional sim- ilarity to biological viruses, in that they can spread rapid- ly throughout a host system. The term is sometimes used in a general sense to cover many different types of harmful software, such as Trojan hor- ses or network worms. Network Worm: A name for a program or command file that uses a computer network as a means for causing damage to computing systems. From one system, a network worm may at- tack a second system by first establishing a network connec- tion with the second system. The worm may then spread to other systems in the same man- ner. A network worm is simil- ar to a computer virus in that its instructions can cause many different forms of damage. However, a worm is a self-contained program that spreads to other systems, whereas a virus spreads to programs within the same sys- tem (a worm could do that as well). Malicious Software: A general term for computer viruses, network worms, Trojan horses, and other software designed to deliberately circumvent established security mechanisms or codes of ethical conduct or both, to adversely affect the confidentiality, integrity, or availability of computer systems and networks. Unauthorized User(s): A user who knowingly uses a system in a non-legitimate manner. The user may or may not be an authorized user of the system. The actions of the user violate established security mechanisms or policies, or codes of ethical conduct, or both. Trojan Horse: A name for a program that disguises its harmful intent by purporting to accomplish some harmless and possibly useful function. For example, a Trojan horse program could be advertised as a calculator, but it may actually perform some other function when executed such as modifying files. Back Door: An entry point to a program or system that is hidden or disguised, perhaps created by the software's author for maintenance or other convenience reasons. For example, an operating sys- tem's password mechanism may contain a back door such that a certain sequence of control characters may permit access to the system manager account. Once a back door be- comes known, it can be used by unauthorized users or malicious software to gain entry and cause damage. Time Bomb, Logic Bomb: Mechanisms used by some examples of malicious software to cause damage after a predetermined event. In the case of a time bomb, the event is a certain system date, whereas for a logic bomb, the event may vary. For example, a computer virus may infect other programs, yet cause no other immediate damage. If the virus contains a time bomb mechanism, the infected programs would routinely check the system date or time and compare it with a preset value. When the actual date or time matches the preset value, the destructive aspects of the virus code would be executed. If the virus contains a logic bomb, the triggering event may be a certain sequence of key strokes, or the value of a counter. Anti-Virus Software: Software designed to detect the occur- rence of a virus. Sold as commercial products and as shareware, anti-virus programs can scan software for known viruses or monitor a system's behavior and raise alarms when activity occurs that is typi- cal of certain types of computer viruses. Isolated System: A system that has been specially configured for determining whether applicable programs contain viruses or other types of malicious software. The system is generally disconnected from any computer networks or linked systems, and contains test data or data that can be restored if damaged. The system may use anti-virus or other monitoring software to detect the presence of malicious software. Computer Security: The tech- nological safeguards and management procedures that can be applied to computer hardware, programs, data, and facilities to assure the availability, integrity, and confidentiality of computer based resources and to assure that intended functions are performed without harmful side effects. SUGGESTED READINGS Adler, Marc, "Infection Protection: Antivirus Software" PC Magazine, April 25, 1989. Arkin, Stanley et al., "Prevention and Prosecution of High-Tech Crime," Matthew Bender Press Co., 1989. Brenner, Aaron, "LAN Security", LAN Magazine, August 1989. Bunzel, Rick, "Flu Season," Connect, Summer 1988. Cohen, Fred, "Computer Viruses," Proceedings of the 7th DoD/NBS Computer Security Conference, 1984. Computer Viruses - Proceedings of an Invitational Symposium, Oct 10/11, 1988, Deloitte, Haskins, and Sells, 1989. Denning, Peter J., "Computer Viruses," American Scientist, Volume 76 May-June 1988. Denning, Peter J., "The Internet Worm," American Scientist, Volume 77, March-April 1989. Dewdney, A. K., "Of Worms, Viruses and Core Wars," Scientific American, March 1989. Dvorak, John, "Virus Wars: A Serious Warning," PC Magazine, Feb 29, 1988. Federal Information Processing Standards Publication 112, Password Usage, National Bureau of Standards, May 1985. Fiedler, David and Hunter, Bruce M., "Unix System Administra- tion," Hayden Books, 1987. Fites, P.F., M.P.J. Kratz, and A.F. Brebner, "Control and Security of Computer Information Systems," Computer Science Press, 1989. Fitzgerald, Jerry, "Business Data Communications: Basic Concepts, Security, and Design," John Wiley and Sons, Inc., 1984. Gasser, Morrie, "Building a Secure Computer System," Van Nostrand Reinhold, New York, 1988. Grampp, F. T. and Morris, R. H., "UNIX Operating System Security," AT&T Bell Laboratories Technical Journal, October 1984. Greenberg, Ross, "Know Thy Viral Enemy," Byte Magazine, June 1989. Hatkin, Martha E, and Robert B. J. Warner, "Smart Card Technol- ogy: New Methods for Computer Access Control," NIST Special Publication 500-157, National Institute of Standards and Tech- nology, September 1988. Hoffman, Lance, "Modern Methods for Computer Security and Privacy," Prentice-Hall, 1977. Honan, Patrick, "Avoiding Virus Hysteria," Personal Computing, May 1989. Kurzban, Stanley A., "Viruses and Worms--What Can You Do?," ACM SIG Security, Audit, & Control, Volume 7 Number 1, Spring 1989. Lipner, S. and S. Kalman, "Computer Law,", Merrill Publishing Co., 1989. McAfee, John, "The Virus Cure," Datamation, Volume 35, Number 4, February 15, 1989. McLellan, Vin, "Computer Systems Under Siege," The New York Times, January 17, 1988. Murray, William H., "Epidemiology Application to Computer Viruses," Computers and Security, Volume 7, Number 2, April 1988. Parker, T., "Public domain software review: Trojans revisited, CROBOTS, and ATC," Computer Language, April 1987. Pfleeger, Charles, P., "Security in Computing," Prentice-Hall, 1989. Pozzo, Maria M., and Terence E. Gray, "An Approach to Containing Computer Viruses," Computers and Security, Volume 6, Number 4, August 1987. Rubenking, Neil, "Infection Protection," PC Magazine, April 25, 1989. Schnaidt, Patricia, "Fasten Your Safety Belt," LAN Magazine, October 1987. Shoch, John F., and Jon A. Hupp, "The Worm Programs--Early Experience with a Distributed Computation," Communications of the ACM, Volume 25, Number 3, March 1982. Spafford, Eugene H., "The Internet Worm Program: An Analysis," Purdue Technical Report CSD-TR-823, November 28, 1988. Spafford, Eugene H., Kathleen A. Heaphy, and David J. Ferbrache, "Computer Viruses - Dealing with Electronic Vandalism and Programmed Threats," ADAPSO Software Industry Division Report, 1989. Stefanac, Suzanne, "Mad MACS," Macworld, November 1988. Steinauer, Dennis D., NBS Special Publication 500-120, Security of Personal Computer Systems: A Management Guide, National Bureau of Standards, January 1985. Stohl, Clifford, "The Cuckoo's Egg," Doubleday, 1989. Thompson, Ken, "Reflections on Trusting Trust (Deliberate Software Bugs)," Communications of the ACM, Vol 27, August 1984. Tinto, Mario, "Computer Viruses: Prevention, Detection, and Treatment," National Computer Security Center C1 Tech. Rpt. C1- 001-89, June 1989. Wack, John P., and Lisa J. Carnahan, "Computer Viruses and Related Threats: A Management Guide," NIST Special Publication 500-166, National Institute of Standards and Technology, August 1989. White, Steve R., David M. Chess, and Chengi Jimmy Kuo, "Coping with Computer Viruses and Related Problems," Research Report Number RC 14405, International Business Machines Corporation, Yorktown Heights, New York, 1989, adapted and distributed as "Coping with Computer Viruses and Related Problems," Form G320- 9913, International Business Machines Corporation, September 1989. Witten, I. H., "Computer (In)security: infiltrating open sys- tems," Abacus (USA), Summer 1987. ELECTRONIC FORUMS: VIRUS-L is a moderated mail forum for discussing computer virus issues; comp.virus is a non-digested Usenet counterpart. Infor- mation on accessing anti-virus, documentation, and back-issue archives is distributed periodically on the list. Send subscrip- tion requests to: LISTSERV@LEHIIBM1.BITNET. In the body of the message, enter "SUB VIRUS-L your name" RISKS-FORUM Digest is a moderated mail forum for discussing computer security issues as well as risks associated with other forms of technology. Send subscription requests to: RISKS-Request@CSL.SRI.COM. The NIST Security Bulletin Board is a repository of computer security information open to the general public. Users can download files, send messages, participate in forums, and access security alert information. Dial (301) 948-5717 at 2400/1200/300 BPS, parity none, 1 stop bit, 8- bit characters.