Advertisement

Viruses

  • David Salomon
Chapter
Part of the Undergraduate Topics in Computer Science book series (UTICS)

Abstract

Computer viruses are the most familiar type of rogue software. A virus is a computer program that hides inside another program in a computer or on a disk drive, that attempts to propagate itself to other computers, and that often includes some destructive function (payload). This chapter discusses the main features of viruses and what makes them different from other types of software. The dictionary defines the adjective “rogue” as “large, destructive, and anomalous or unpredictable” and also as “operating outside normal or desirable controls.” Rogue software generally conforms to these definitions. It is not large, but it is virtually always destructive. It is anomalous because it replicates, and it operates outside of normal controls. This is software specifically designed, implemented, and tested to invade a computer, to replicate and spread to other computers, and to cause harm.

Keywords

Trojan Horse Computer Virus Covert Channel Executable Program Host Program 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

  1. badguys (2005) is http://www.badguys.org/.
  2. Bell, D. E., and L. J. LaPadula (1974) “Secure Computer Systems: Mathematical Foundations and Model,” Technical report, MITRE.Google Scholar
  3. Cohen, Frederick B. (1994a) A Short Course on Computer Viruses, 2nd edition, New York, NY, John Wiley & Sons.Google Scholar
  4. Cohen, Frederick B. (1994b) It’s Alive! The New Breed of Living Computer Programs, New York, NY, John Wiley & Sons.Google Scholar
  5. Dawkins, Richard (2006) The Selfish Gene, 3rd Edition, New York, Oxford University Press.Google Scholar
  6. eeggs (2005) is http://www.eeggs.com/.
  7. Encyc1 (2004) is www3.ca.com/securityadvisor/virusinfo/browse.aspx.Google Scholar
  8. Encyc2 (2004) is securityresponse.symantec.com/avcenter/file vinfodb.html.Google Scholar
  9. Gerrold, David (1988) When HARLIE Was One, Bantam Spectra (Random House), Updated edition.Google Scholar
  10. Gordon, Sarah (2005) “VirusWriters: The End of The Innocence?” available at research.ibm.com/antivirus/SciPapers/VB2000SG.htm.Google Scholar
  11. Harley, David, Robert Slade, and Urs Gattiker (2001) Viruses Revealed, Berkeley, CA, Osborne/McGraw-Hill.Google Scholar
  12. Hart-Davis, Guy (2009) Word 2007 Macros & VBA Made Easy, Berkeley, CA, Osborne/McGraw-Hill.Google Scholar
  13. MS04 (2004) is microsoft.com/technet/security/bulletin/file MS04-028.mspx.Google Scholar
  14. Roman, Steven (1999) Writing Word Macros, Sebastopol, CA, O’Reilly Assoc.Google Scholar
  15. Salomon, David (2007) Data Compression: The Complete Reference, 4th edition, New York, Springer-Verlag.Google Scholar

Copyright information

© Springer London 2010

Authors and Affiliations

  1. 1.Computer Science Dept.California State University, NorthridgeNorthridgeUSA

Personalised recommendations