Abstract
The term computer virus was first used in 1984 and is now well known to the general public. Computers are increasingly pervasive in the workplace and in homes. Most users of the Internet, and more generally any network, have faced the malware risk at least once. However, it appears that in practice, users’ knowledge (in the broadest sense of the term) with respect to computer virology is still contains so flawed that the risk is increased instead of being reduced. The term virus itself is improperly used to designate a more general class of programs that have nothing to do with viruses: worms, Trojans, logic bombs, lures, etc. Viruses, in addition, cover a reality farmore complex. Many sub-categories exist, and many viral techniques relate to them, all involving different risks, which must be known for protection and an effective fight.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
J. Kraus: Selbstreproduktion bei Programmen, Diploma Thesis (Universität Dortmund, Dortmund 1980), english translation (published by D. Bilar, E. Filiol): On Selfreproducing Programs, J. Comput. Virol. 5(1), 9–87 (2009)
F. Cohen: Computer viruses, Ph.D. Thesis (University of Southern California, Los Angeles, USA 1986)
L.M. Adleman: An abstract theory of computer viruses. In: Advances in Cryptology – CRYPTO’88 (Springer, Berlin 1988) pp. 354–374
E. Filiol: L’ingénierie sociale, Linux Mag. 42, 30–35 (2002)
J. von Neumann: Theory of Self-Reproducing Automata, ed. by A.W. Burks (University of Illinois Press, Urbana 1966)
E. Filiol: Computer Viruses: From Theory to Applications, IRIS International Series, 2nd edn. (Springer, Paris, France 2009)
E. Filiol: Analyse du macro-ver OpenOffice/BadBunny, MISC Le journal de la sécuritéinformatique 34, 18–20 (2007)
A. Blonce, E. Filiol, L. Frayssignes: portable document format (PDF) security analysis and malware threats, Black Hat Europe 2008 Conference, Amsterdam, www.blackhat.com/archives (2008)
D. Moore: The spread of the Code-Red worm (CRv2) http://www.caida.org/analysis/security/code-red/coderedv2_analysis.xml (2001)
A. Ondi, R. Ford: How good is good enough? Metrics for worm/anti-worm evaluation, J. Comput. Virol. 3(2), 93–101 (2007)
E. Filiol, E. Franc, A. Gubbioli, B. Moquet, G. Roblot: Combinatorial optimisation of worm propagation on an unknown network, Int. J. Comput. Sci. 2(2), 124–130 (2007)
E. Filiol: Techniques virales avancées, Collection IRIS (Springer, Paris, France 2007), English translation due October 2009
Y. Dodge: Premiers pas en statistiques (Springer, Paris, France 2005)
J. Hruska: (2002) Computer virus prevention: a primer, http://www.sophos.com/virusinfo/whitepapers/prevention.html
Recommendation 600/DISSI/SCSSI, Protection des informations sensibles ne relevant pas du secret de Défense, Recommendation pour les postes de travail informatiques (Délégation Interministérielle pour la Sécuritédes Systèmes d’Information, March 1993)
A. Foucal, T. Martineau: Application concrète d’une politique antivirus, MISC Le journal de la sécuritéinformatique 5, 36–40 (2003)
M. Brassier: Mise en place d’une cellule de veille technologique, MISC Le journal de la sécuritéinformatique 5, 6–11 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Filiol, E. (2010). Viruses and Malware. In: Stavroulakis, P., Stamp, M. (eds) Handbook of Information and Communication Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04117-4_34
Download citation
DOI: https://doi.org/10.1007/978-3-642-04117-4_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04116-7
Online ISBN: 978-3-642-04117-4
eBook Packages: EngineeringEngineering (R0)