메뉴 건너뛰기




Volumn 49, Issue 1, 2003, Pages 280-284

Reliable identification of bounded-length viruses is NP-complete

Author keywords

Buffer overflow; Complexity; Detection; Identification; Mutation; NP complete; Security; Virus

Indexed keywords

CODES (SYMBOLS); COMPUTER VIRUSES; SECURITY OF DATA;

EID: 0037269111     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2002.806137     Document Type: Article
Times cited : (71)

References (19)
  • 2
    • 0028514027 scopus 로고
    • A taxonomy of computer program security flaws
    • Sept.
    • C.E. Landwehr, A. R. Bull, J. P. McDermott, and W. S. Choi, "A taxonomy of computer program security flaws," ACM Comput. Surv., vol. 26, no. 3, pp. 211-254, Sept. 1994.
    • (1994) ACM Comput. Surv. , vol.26 , Issue.3 , pp. 211-254
    • Landwehr, C.E.1    Bull, A.R.2    McDermott, J.P.3    Choi, W.S.4
  • 3
    • 0013175067 scopus 로고
    • Computer viruses
    • May-June
    • P. J. Denning, "Computer viruses," Amer. Scientist, pp. 236-238, May-June 1988.
    • (1988) Amer. Scientist , pp. 236-238
    • Denning, P.J.1
  • 4
    • 0023294949 scopus 로고
    • Computer viruses: Theory and experiments
    • Feb.
    • F. Cohen, "Computer viruses: Theory and experiments," Comput. Security, vol. 6, no. 1, pp. 22-35, Feb. 1987.
    • (1987) Comput. Security , vol.6 , Issue.1 , pp. 22-35
    • Cohen, F.1
  • 7
    • 0013135152 scopus 로고    scopus 로고
    • Analysis and detection of computer viruses and worms: An annotated bibliography
    • Feb.
    • P. K. Singh and A. Lakhotia, "Analysis and detection of computer viruses and worms: An annotated bibliography," ACM SIGPLAN Notices, vol. 37, no. 2, pp. 29-35, Feb. 2002.
    • (2002) ACM SIGPLAN Notices , vol.37 , Issue.2 , pp. 29-35
    • Singh, P.K.1    Lakhotia, A.2
  • 8
    • 0003602325 scopus 로고
    • RFC 1321: The MD5 message-digest algorithm
    • Apr.
    • R. Rivest, "RFC 1321: The MD5 message-digest algorithm," Status: INFORMATIONAL, Apr. 1992.
    • (1992) Status: INFORMATIONAL
    • Rivest, R.1
  • 9
    • 84976781807 scopus 로고
    • Reflections on trusting trust
    • Aug.
    • K. L. Thompson, "Reflections on trusting trust," Commun. ACM, vol. 27, no. 8, pp, 761-763, Aug. 1984.
    • (1984) Commun. ACM , vol.27 , Issue.8 , pp. 761-763
    • Thompson, K.L.1
  • 10
    • 0001082723 scopus 로고
    • Experience with viruses on UNIX systems
    • Spring
    • T. Duff, "Experience with viruses on UNIX systems," Computing Syst., vol. 2, no. 2, pp. 155-171, Spring 1989.
    • (1989) Computing Syst. , vol.2 , Issue.2 , pp. 155-171
    • Duff, T.1
  • 11
    • 0013083839 scopus 로고
    • Virology 101
    • Spring
    • M. D. McIlroy, "Virology 101," Computing Syst., vol. 2, no. 2, pp. 173-184, Spring 1989.
    • (1989) Computing Syst. , vol.2 , Issue.2 , pp. 173-184
    • McIlroy, M.D.1
  • 12
    • 0013141938 scopus 로고    scopus 로고
    • June. Online
    • F. Perriot, P. Ferric, and P. Ször. (2002, June) W32/Simile. [Online]. Available: http://www.virusbtn.com/resources/viruses/indepth/simile.xml.
    • (2002) W32/Simile
    • Perriot, F.1    Ferric, P.2    Ször, P.3
  • 13
    • 0024682488 scopus 로고
    • Computational aspects of computer viruses
    • June
    • F. Cohen, "Computational aspects of computer viruses," Computers & Security, vol. 8, no. 4, pp. 325-344, June 1989.
    • (1989) Computers & Security , vol.8 , Issue.4 , pp. 325-344
    • Cohen, F.1
  • 14
    • 84960561455 scopus 로고
    • On computable numbers, with an application to the Entscheidungs problem
    • corrections in vol. 2, no. 43, pp. 544-546
    • A. M. Turing, "On computable numbers, with an application to the Entscheidungs problem," in Proc. London Math. Soc., vol. 2, pp. 230-265, 1936, corrections in vol. 2, no. 43, pp. 544-546.
    • (1936) Proc. London Math. Soc. , vol.2 , pp. 230-265
    • Turing, A.M.1
  • 15
    • 77954744592 scopus 로고    scopus 로고
    • An undetectable computer virus
    • Online. June
    • D. M. Chess and S. R. White, "An undetectable computer virus," in Virus Bulletin Conf, Sept. 2000, [Online]. Available: http://www.research.ibm.com/antivirus/SciPapers/VB2000DC.pdf, June 2002.
    • (2002) Virus Bulletin Conf, Sept. 2000
    • Chess, D.M.1    White, S.R.2
  • 16
    • 0017547820 scopus 로고
    • A fast string searching algorithm
    • Oct.
    • R. S. Boyer and J. S. Moore, "A fast string searching algorithm," Commun. ACM, vol. 20, no. 10, pp, 262-272, Oct. 1977.
    • (1977) Commun. ACM , vol.20 , Issue.10 , pp. 262-272
    • Boyer, R.S.1    Moore, J.S.2
  • 17
  • 19
    • 0024663403 scopus 로고
    • With microscope and tweezers: An analysis of the internet vires of November 1988
    • Oakland, CA, May
    • M. W. Eichlin and J. A. Rochlis, "With microscope and tweezers: An analysis of the internet vires of November 1988," in Proc. IEEE Symp. Research in Security and Privacy, Oakland, CA, May 1989, pp. 326-345.
    • (1989) Proc. IEEE Symp. Research in Security and Privacy , pp. 326-345
    • Eichlin, M.W.1    Rochlis, J.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.