期刊文献+

恶意程序的检测和删除 被引量:2

Detection and Deletion on Vicious Procedures
下载PDF
导出
摘要 文章介绍了恶意程序的分类,分析了需要宿主的恶意程序和可以独立运行的恶意程序的特点。对于恶意代码提出了可实施的检测系统方案和删除的方法。研究和提出了数字免疫系统的基本结构和工作原理。 The classes of vicious procedures are introduced and characteristics of vicious procedures that can or cannot run independently are analyzed. An executable examining project and method of cleaning viciousness code are presented. The basic framework and the work principle of data immunity system are researched and presented.
出处 《微电子学与计算机》 CSCD 北大核心 2002年第1期11-14,共4页 Microelectronics & Computer
关键词 恶意程序 检测 删除 计算机病毒 反病毒技术 特洛伊程序 Vicious procedure, Copy, Detection, Deletion
  • 相关文献

参考文献4

  • 1Shimeall, Timothy J.; McDermott, John J. Software Security in an Internet World: An Executive Summary. IEEE Software, 1999, 16(4).
  • 2Shimeall T J. Intelligence Analysis for Intemet Security:Ideas, Barriers and Possibilities, Proceedings of SPIE - The International Society for Optical Engineering, 2001:63 ~74.
  • 3Ray Hunt. Internet/intranet Firewall Security- policy, Architecture and Transaction Services [J] . Computer Communication, 1998, 21: 1107 ~ 1123.
  • 4Matthew Strebe,Charles Perkins.网络安全性,电子工业出版社,1999.1.

同被引文献11

  • 1[1]Eye Digital Security. Sapphire worm code disassembled [EB/OL]. http://www. eeye. com/html/Research/Flash/sapphire. txt, 2004.4.
  • 2[2]Eugene H Spafford. The Internet Worm Program: An Analysis [J]. ACM Computer Communication Review, 1989; 19 ( 1 ):17-57.
  • 3HENZINGER TA,JHALA R,MAJUMDAR R,et al.Thread-modular Abstraction Refinement[A].Proceedings of the 15th International Conference on Computer-Aided Verification(CAV)[C].Lecture Notes in Computer Science,Springer-Verlag,2003.
  • 4LIBLIT B,AIKEN A,ZHENG AX,et al.Bug Isolation via Remote Program Sampling[A].Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation (PLDI 2003)[C].San Diego,California,2003.
  • 5COWAN C,PU C,MAIER D,et al.Stackguard:Automatic adaptive detection and prevention of buffer-overflow attacks[A].Proceeding of the Seventh USENIX Security Symposium[C].San Antonio,1998.63-77.
  • 6WAGNER D,FOSTER JS,BREWER EA,et al.A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities[A].Preceedings of Network and Distributed Systems Security Symposium (NDSS 2000)[C].2000.
  • 7LANDWEHR CE,BULL AR,MCDERMOTT JP,et al.A Taxonomy of Computer Program Security Flaws[J].Computing Surveys,1994,26(3):211 -255.
  • 8NAZARIO J.Source Code Scanners for Better Code[EB/OL].http://www.linuxjournal.com/article/5673,2002.
  • 9VOAS JM,MCGRAW G.Software Fault Injection:Inoculating Programs Against Errors[M].John Wiley and Sons,New York,1998.
  • 10黄建中.Nimda(尼姆达)的特性分析及防范[J].计算机与现代化,2002(11):32-33. 被引量:1

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部