[
Deutsch][English][
Español][
Italiano][
Français][
Polski][
Русский][
Українська]
Library: Index by date
[
Back to category index]
2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001 2000 1999 1998 1997 1996 1995 1994 1993 1992 1991 1990 1989 1988 1987 1985 1984 1982 1977 1975 1972 1971 1958 1957 Unknown 2011
«
"Smart" trash: building of logic» by
pr0mix [
Abstract]
15.8Kb«
$$$_+$$+$$__+_$+$$_$+$$$_+$$_$» by
Peter Ferrie [
Abstract]
19.43Kb«
'Holey' virus, Batman!» by
Peter Ferrie [
Abstract]
13.34Kb«
010 Editor Scripts» by
roy g biv [
Abstract]
7.37Kb«
Advanced EPO: Deeper, longer and harder (Part 1)» by
herm1t [
Abstract]
15.09Kb«
As above, sobelow» by
Peter Ferrie [
Abstract]
12.23Kb«
BOMbing The System» by
roy g biv [
Abstract]
7.12Kb«
Book worm» by
Paul Baccas [
Abstract]
7.51Kb«
BTX encryption» by
hh86 [
Abstract]
4.02Kb«
Catch Me If You Can» by
Gregory Benford [
Abstract]
7.95Kb«
Code Mutations via Behaviour Analysis» by
SPTH [
Abstract]
21.47Kb«
Computer Programs, Weapons of War in a Digital World» by
The Ollin [
Abstract]
16.86Kb«
DarkMarket: cyberthieves, cybercops and you» by
Misha Glenny [
Abstract]
521.51Kb«
The DLIT EPO techinque» by
hh86 [
Abstract]
2.52Kb«
EPO in C LUA DLLs» by
hh86 [
Abstract]
1.75Kb«
Flibi night» by
Peter Ferrie [
Abstract]
11.08Kb«
Flibi: Evolution» by
Peter Ferrie [
Abstract]
36.11Kb«
Flibi: Reloaded» by
Peter Ferrie [
Abstract]
13.92Kb«
Frankie say relax» by
Peter Ferrie [
Abstract]
13.26Kb«
Function Me» by
hh86 [
Abstract]
3.2Kb«
Hard Disk Woes» by
Jorge Lodos,
Jesús Villabrille,
Edgar Guadis [
Abstract]
13.83Kb«
Heaven's Gate: 64-bit code in 32-bit file» by
roy g biv [
Abstract]
7.28Kb«
Hidden in .NET» by
hh86 [
Abstract]
4.71Kb«
I Err.Raise, you fall» by
hh86 [
Abstract]
6.31Kb«
Imitation of Life: Advanced system for native Artificial Evolution» by
SPTH [
Abstract]
42.06Kb«
Infecting Mathematica Notebook files» by
SPTH [
Abstract]
15.46Kb«
Interview with Second Part To Hell» by
alcopaul [
Abstract]
13.83Kb«
Inversing a random numbers» by
herm1t [
Abstract]
7.21Kb«
JScript Prototypes» by
roy g biv [
Abstract]
5.43Kb«
Malware Statistical analysis and countermeasures» by
M0SA [
Abstract]
8.95Kb«
The Masquerader» by
hh86 [
Abstract]
3.85Kb«
Matlab.MicrophoneFever2» by
SPTH [
Abstract]
85.01Kb«
PE Infector» by
Marco Ramilli [
Abstract]
4.77Kb«
Some ideas to increase detection complexity» by
SPTH [
Abstract]
13.62Kb«
Stux in a rut: Why Stuxnet is boring» by
John Aycock [
Abstract]
16.83Kb«
The true Export/Import business» by
hh86 [
Abstract]
3.16Kb«
Worm: The First Digital World War» by
Mark Bowden [
Abstract]
404.25Kb2010
«
Analysis of the "Offensive Polymorphic Engine v2"» by
Alumna [
Abstract]
6.01Kb«
Deelaed learning» by
Peter Ferrie [
Abstract]
15.94Kb«
Delta Offset» by
Tokugawa Ieyasu [
Abstract]
5.37Kb«
Doin' the eagle rock» by
Peter Ferrie [
Abstract]
14.07Kb«
Interview with herm1t» by
Perforin [
Abstract]
14.17Kb«
Interview with hh86» by
SPTH [
Abstract]
9.19Kb«
It's a bird, it's a plane, it's Fooperman» by
Peter Ferrie [
Abstract]
18.43Kb«
The missing LNK» by
Peter Ferrie [
Abstract]
14.34Kb«
The Risk of Debug Codes in Batch: what are debug codes and why they are dangerous?» by
ZeroP [
Abstract]
6.21Kb«
Slade's Virus Books Reviews» by
Robert Slade [
Abstract]
182.45Kb«
Taking the redpill: Artificial Evolution in native x86 systems» by
SPTH [
Abstract]
41.93Kb2009
«
Anti AV Techniques For Batch» by
cOrRuPt G3n3t!x [
Abstract]
7.77Kb«
Anti Virus Detection Strategies and how to overcome them» by
Tiberio Degano [
Abstract]
20.76Kb«
Are Evolutionary Rule Learning Algorithms Appropriate for Malware Detection?» by
Zubair Shafiq,
Momina Tabish,
Muddassar Farooq [
Abstract]
11.91Kb«
Batch IRC/Outlook Spreading» by
cOrRuPt G3n3t!x [
Abstract]
12.21Kb«
Batch Run Techniques» by
cOrRuPt G3n3t!x [
Abstract]
7.07Kb«
Biological Aspects of Computer Virology» by
Vasileios Vlachos,
Diomidis Spinellis,
Stefanos Androutsellis-Theotokis [
Abstract]
33.39Kb«
Can you spare a seg?» by
Peter Ferrie [
Abstract]
9.83Kb«
Countering Kernel Rootkits with Lightweight Hook Protection» by
Zhi Wang,
Xuxian Jiang,
Weidong Cui,
Peng Ning [
Abstract]
71.47Kb«
Do-It-Yourself Guide to Cell Phone Malware» by
William Mahoney,
Craig Pokorny [
Abstract]
18.06Kb«
Easy To Infect Hard to Detect» by
Tiberio Degano [
Abstract]
24.82Kb«
Flying solo» by
Peter Ferrie [
Abstract]
9.88Kb«
From position-independent to self-relocatable viral code» by
herm1t [
Abstract]
26.34Kb«
Genetic algorithm based Internet worm propagation strategy modeling under pressure of countermeasures» by
N. Goranin,
A. Cenys [
Abstract]
30.9Kb«
Heads or tails?» by
Peter Ferrie [
Abstract]
7.34Kb«
Heaven's Gate: 64-bit code in 32-bit file» by
roy g biv [
Abstract]
4.79Kb«
Hiding your virus in the matrix» by
SPTH [
Abstract]
19.92Kb«
The Hiew Plugin framework» by
roy g biv [
Abstract]
3.74Kb«
Making a hash of things» by
Peter Ferrie [
Abstract]
10.53Kb«
MEANDERINGS: Theory On batch Keylogging» by
cOrRuPt G3n3t!x [
Abstract]
7.36Kb«
Modern Day ELF Runtime infection via GOT poisoning» by
Ryan O'Neill [
Abstract]
92.41Kb«
Polymorphism In Batch» by
cOrRuPt G3n3t!x [
Abstract]
7.77Kb«
Prescription Medicine» by
Peter Ferrie [
Abstract]
22.41Kb«
The Spam Book: On Viruses, Porn and Other Anomalies From the Dark Side of Digital Culture» by
Tony Sampson,
Jussi Parikka [
Abstract]
855.82Kb«
A study of anti-virus' response to unknown threats» by
Christophe Devine,
Nicolas Richaud [
Abstract]
34.55Kb«
Subtle SEH» by
roy g biv [
Abstract]
4.38Kb«
Technological Turf Wars: A Case Study of the Computer Antivirus Industry» by
Jessica Johnston [
Abstract]
485.43Kb«
Twinkle, twinkle little star» by
Peter Ferrie [
Abstract]
17.93Kb«
Unpredictable Legacies: Viral Games in the Networked World» by
Roberta Buiani [
Abstract]
71.86Kb«
Writing disassembler» by
mdew [
Abstract]
19.71Kb2008
«
Advanced Metamorphic Techniques in Computer Viruses» by
Philippe Beaucamps [
Abstract]
65.42Kb«
Are the Current Computer Crime Laws Sufficient or Should the Writing of Virus Code Be Prohibited?» by
Robert Kroczynski [
Abstract]
150.83Kb«
Caveat virus» by
herm1t [
Abstract]
7.88Kb«
Chomsky Hierarchy and the Word Problem in Code Mutation» by
SPTH [
Abstract]
18.67Kb«
Crimea river» by
Peter Ferrie [
Abstract]
12.26Kb«
Darwin inside the machines: Malware evolution and the consequences for computer security» by
Dimitris Iliopoulos,
Christoph Adami,
Péter Ször [
Abstract]
41.7Kb«
Evolutionary Virus Propogation Technique» by
saec [
Abstract]
9.86Kb«
Future visions about virus writing» by
izee [
Abstract]
2.16Kb«
How to have fun with ptrace syscall» by
Cyberdude [
Abstract]
18.38Kb«
New anti-debugging possibilities» by
izee [
Abstract]
9.77Kb«
A pilot study on college student's attitudes toward computer virus» by
Eric Zhi-Feng Liu [
Abstract]
8.16Kb«
Prophet and loss» by
Peter Ferrie 15Kb«
The road less truvelled» by
Peter Ferrie [
Abstract]
9.7Kb«
A simple way to detect VirtualBox» by
WarGame [
Abstract]
2.17Kb«
Some ideas about OpenOffice infection» by
WarGame [
Abstract]
7.41Kb«
Somehow we should... Web 2.0» by
SPTH [
Abstract]
3.52Kb«
Stealth API-based decryptor» by
kaze [
Abstract]
24.1Kb«
Supercompilation for Equivalence Testing in Metamorphic Computer Viruses Detection» by
Alexei Lisitsa,
Matt Webster [
Abstract]
15.66Kb«
Threats to Digitization: Computer Virus» by
Bhaskar Mukherjee [
Abstract]
30.38Kb«
VirtualBox's Virtual Disks Infection» by
WarGame [
Abstract]
23.4Kb2007
«
Ani-hilate this week» by
Peter Ferrie [
Abstract]
9.74Kb«
Bad Transfer» by
Peter Ferrie,
Péter Ször [
Abstract]
12.15Kb«
Cain and Abul» by
Peter Ferrie [
Abstract]
9.93Kb«
Classification of Computer Viruses Using the Theory of Affordances» by
Matt Webster,
Grant Malcolm [
Abstract]
71.11Kb«
Combinatorial Optimisation of Worm Propagation on an Unknown Network» by
Eric Filiol,
Edouard Franc,
Alessandro Gubbioli,
Benoit Moquet,
Guillaume Roblot 35.83Kb«
Computer Viruses: Why writing and making available a computer virus is not a crime» by
Ellipsis [
Abstract]
5.37Kb«
Crawling - A unique spreading technique» by
freeon [
Abstract]
15.29Kb«
The Design Space of Metamorphic Malware» by
Andrew Walenstein,
Rachit Mathur,
Mohamed Chouchane,
Arun Lakhotia [
Abstract]
38.28Kb«
Do the macarena» by
Peter Ferrie [
Abstract]
10.31Kb«
FBSL Virus Writing Guide» by
Genetix [
Abstract]
14.55Kb«
Hashes for Encryption» by
SPTH [
Abstract]
9.62Kb«
Hashin' the elves» by
herm1t [
Abstract]
22.24Kb«
Hidan and dangerous» by
Peter Ferrie [
Abstract]
9.54Kb«
INT 0x80? No, thank you!» by
herm1t [
Abstract]
14.86Kb«
Interview with herm1t» by
izee 12.76Kb«
Interview with roy g biv» by
izee 24.5Kb«
Interview with synge» by
killkir 6.53Kb«
Limits of Static Analysis for Malware Detection» by
Andreas Moser,
Christopher Kruegel,
Engin Kirda [
Abstract]
55.71Kb«
Lions and Tigraas» by
Peter Ferrie [
Abstract]
5.44Kb«
Metamorphism, Formal Grammars and Undecidable Code Mutation» by
Eric Filiol [
Abstract]
37.47Kb«
Protection Schemes Based on Virus Survival Techniques» by
Jeffrey Walton [
Abstract]
88.04Kb«
Remote Polymorphism and Customized Viruses» by
freeon [
Abstract]
8.17Kb«
Reverse of a coin: A short note on segment alignment» by
herm1t [
Abstract]
8.72Kb«
Something smells fishy» by
Peter Ferrie [
Abstract]
5.15Kb«
Using Skype for VX» by
WarGame [
Abstract]
3.02Kb«
Virtual Code» by
roy g biv [
Abstract]
6.29Kb«
Writing irc worms for xchat2» by
WarGame 4.92Kb2006
«
"Good" Worms and Human Rights» by
John Aycock,
Alana Maurushat [
Abstract]
28.13Kb«
Analysis of Virus Algorithms» by
Jyoti Kalyani,
Karanjit Singh Kahlon,
Harpal Singh,
Anu Kalyani [
Abstract]
22.31Kb«
Ars loricatus novus or A small introduction to retro-armoring» by
Nomenumbra [
Abstract]
16.65Kb«
A brief viral Introduction into F#» by
SPTH [
Abstract]
11.17Kb«
Chamber of horrors» by
Peter Ferrie [
Abstract]
9.75Kb«
Computer Viruses and Malware» by
John Aycock [
Abstract]
499.29Kb«
Computers under attacks!» by
Anne Bonfante,
Jean-Yves Marion [
Abstract]
13.87Kb«
Computerviruses meet Infopath» by
SPTH [
Abstract]
15.95Kb«
An Epidemiological View of Worms and Viruses» by
Thomas Chen [
Abstract]
17.97Kb«
EPOlution: The Evolution of Entry Point Obscuring» by
roy g biv [
Abstract]
5.49Kb«
The Evolution of the Computer Virus» by
Shaun DeRosa [
Abstract]
4.66Kb«
Explaining the Usages of Pipes in Virus coding» by
berniee [
Abstract]
6.89Kb«
Ferite virus writing guide» by
WarGame 8.55Kb«
Finding DC++ ShareFolders Via Xml in C#» by
Retro [
Abstract]
2.14Kb«
Gatt got your tongue?» by
Peter Ferrie [
Abstract]
9.73Kb«
Hunting for Metamorphic Engines» by
Wing Wong,
Mark Stamp [
Abstract]
67.55Kb«
Hypervirus: A Clinical Report» by
Thierry Bardini [
Abstract]
44.81Kb«
The IDA Scripting Language» by
roy g biv [
Abstract]
5.03Kb«
Infecting ELF-files using function padding for Linux» by
herm1t [
Abstract]
25.5Kb«
Infecting Mach-O Files» by
roy g biv [
Abstract]
8.02Kb«
Infecting PE files By Adding new resource» by
berniee [
Abstract]
8.26Kb«
Interview with DiA» by
izee [
Abstract]
12.53Kb«
Interview with Karl Sims» by
SPTH [
Abstract]
4.1Kb«
Interview with Ralph Burger» by
SPTH [
Abstract]
4.83Kb«
Interview with Retro» by
izee [
Abstract]
9.64Kb«
Interview with Tom Ray» by
SPTH [
Abstract]
11.63Kb«
Is Your Cat Infected with a Computer Virus?» by
Melanie Rieback,
Bruno Crispo,
Andrew Tanenbaum [
Abstract]
45.92Kb«
Leaps and Bounds» by
Peter Ferrie [
Abstract]
11.69Kb«
The metamorphosis of malware writers» by
Danny Bradbury [
Abstract]
10.22Kb«
Not worthy» by
Peter Ferrie [
Abstract]
4.81Kb«
On the definition and classification of cybercrime» by
Sarah Gordon,
Richard Ford [
Abstract]
37.98Kb«
Open problems in computer virology» by
Eric Filiol,
Marko Helenius,
Stefano Zanero [
Abstract]
67.91Kb«
A Pact with the Devil» by
Mike Bond,
George Danezis [
Abstract]
37.99Kb«
Painting the Internet: A Different Kind of Warhol Worm» by
John Aycock [
Abstract]
25.38Kb«
Polymorphism using the Microsoft Script Encoder» by
roy g biv [
Abstract]
6.9Kb«
Rebels for the System? Virus writers, general intellect, cyberpunk and criminal capitalism» by
Mathieu O'Neil [
Abstract]
55.55Kb«
Register Initialising Using Only Arithmetic Instructions» by
roy g biv [
Abstract]
6.42Kb«
Run-Time Compiling» by
Retro [
Abstract]
4.41Kb«
Self-Replicating Turing Machines and Computer Viruses» by
Elise de Doncker [
Abstract]
17.25Kb«
Senders, Receivers and Deceivers: How Liar Codes Put Noise Back on the Diagram of Transmission» by
Tony Sampson [
Abstract]
13.21Kb«
Simple worm in delphi and corrections» by
Hutley [
Abstract]
7.1Kb«
The StarOffice Basic» by
roy g biv [
Abstract]
5.41Kb«
SubVirt: Implementing malware with virtual machines» by
Samuel King,
Peter Chen,
Yi-Min Wang,
Chad Verbowski,
Helen Wang,
Jacob Lorch [
Abstract]
64.14Kb«
Thoughts about Morphology in viruses» by
SPTH [
Abstract]
5.27Kb«
Thoughts About The Use Of Garbage Instructions In Polymorphism» by
The Sorcerer [
Abstract]
4.61Kb«
Tumours and polips» by
Peter Ferrie [
Abstract]
23.51Kb«
Using Code Normalization for Fighting Self-Mutating Malware» by
Danilo Bruschi,
Lorenzo Martignoni,
Mattia Monga [
Abstract]
43.98Kb«
Using the .NET runtime compiler for file infection» by
DiA [
Abstract]
13.98Kb«
The Viral Darwinism of W32.Evol» by
Orr [
Abstract]
58.69Kb«
Virus infecting the mIRC» by
Hutley [
Abstract]
4.73Kb«
Viruses using .NET Framework» by
Zsombor Kurdi [
Abstract]
13.06Kb«
Where have the worms and viruses gone? - new trends in malware» by
Eugene Schultz [
Abstract]
30.94Kb«
X-Rays Can Be Bad For Your Virus's Health» by
The Sorcerer [
Abstract]
7.11Kb2005
«
Abusing .CTORS and .DTORS for fun 'n profit» by
Izik [
Abstract]
12.4Kb«
Algebraic Specification of Computer Viruses and Their Environments» by
Matt Webster [
Abstract]
44.86Kb«
The Art of Computer Virus Research and Defense» by
Péter Ször [
Abstract]
1.41Mb«
ASP.NET Virus Writing Guide» by
SPTH [
Abstract]
24.49Kb«
A Bypass of Cohen's Impossibility Result» by
Jan Bergstra,
Alban Ponse [
Abstract]
38.2Kb«
Code Evolution: Follow nature's example» by
SPTH [
Abstract]
17.58Kb«
Compiled HTML» by
roy g biv [
Abstract]
4.64Kb«
Criss-cross» by
Peter Ferrie [
Abstract]
10.19Kb«
Cross-scripting attacks» by
roy g biv [
Abstract]
3.25Kb«
Cryptography and Viruses» by
Simone McCloskey [
Abstract]
28.89Kb«
Detecting Unknown Computer Viruses - A New Approach» by
Mori Akira,
Sawada Toshimi,
Izumida Tomonori,
Inoue Tadashi [
Abstract]
42.59Kb«
Digital Monsters, Binary Aliens - Computer Viruses, Capitalism and the Flow of Information» by
Jussi Parikka [
Abstract]
66.47Kb«
Dr Aycock's Bad Idea: Is the Good Use of Computer Viruses Still a Bad Idea?» by
Tony Sampson [
Abstract]
13.33Kb«
EPOC Virus Tutorial» by
Retro [
Abstract]
5.67Kb«
Fighting EPO Viruses» by
Piotr Bania [
Abstract]
25.37Kb«
Got [Mac]root?» by
Peter Ferrie [
Abstract]
7.67Kb«
How the virus "Remote Shell Trojan" (RST) works» by
Marco Balduzzi [
Abstract]
6.42Kb«
The IDA Plugin framework» by
roy g biv [
Abstract]
5.09Kb«
Interview with SnakeByte» by
SPTH [
Abstract]
5.46Kb«
It's zell(d)ome the one you expect» by
Peter Ferrie,
Heather Shannon [
Abstract]
22.71Kb«
Marginal Networks: The Virus between Complexity and Suppression» by
Roberta Buiani [
Abstract]
45.48Kb«
Monad: Microsoft Command Shell Infection Tutorial» by
SPTH [
Abstract]
10.35Kb«
More Ins and Outs of JunkMail» by
roy g biv [
Abstract]
9.08Kb«
The motivation behind computer viruses» by
Patrick Carnahan,
Dusty Roberts,
Zack Shay,
Jeff Yeary [
Abstract]
35.18Kb«
New era of bootsectorviruses #1: FAT12 IMG infection at Disks» by
SPTH [
Abstract]
17.06Kb«
New era of bootsectorviruses #2: El Torito ISO infection at FAT32» by
SPTH [
Abstract]
19.01Kb«
Not teaching viruses and worms is harmful» by
George Ledin [
Abstract]
4.67Kb«
On the Time Complexity of Computer Viruses» by
Zhihong Zuo,
Mingtian Zhou,
Qing-xin Zhu [
Abstract]
40.53Kb«
Out of Office Responses» by
roy g biv [
Abstract]
29.46Kb«
Over-File Splitting» by
SPTH [
Abstract]
8.92Kb«
Paradise lost» by
Peter Ferrie,
Frédéric Perriot [
Abstract]
12.48Kb«
Polymorphic Games» by
Z0mbie 7.91Kb«
Python Virus Writing Tutorial» by
VortX [
Abstract]
8.58Kb«
The race against malicious software» by
Timothy Arulsuthan [
Abstract]
12.68Kb«
Retro-Virus» by
Lawrence Schoen [
Abstract]
11.02Kb«
Save your fingers - get your fake names from the i-net» by
DiA [
Abstract]
15.03Kb«
Scary Networks? Viruses as Discursive Practice» by
Roberta Buiani 19.83Kb«
The solution in the naming chaos» by
Ferenc Leitold [
Abstract]
31.79Kb«
Some stealth idea's» by
DiA [
Abstract]
7.75Kb«
Surrealism in viruswriting: How to create new ideas» by
SPTH [
Abstract]
4.48Kb«
Time machine» by
Peter Ferrie [
Abstract]
11.18Kb«
Toward an abstract computer virology» by
Guillaume Bonfante,
Matthieu Kaczmarek,
Jean-Yves Marion [
Abstract]
42.82Kb«
Transmission» by
Hari Kunzru [
Abstract]
537.63Kb«
Trojans, Worms and Spyware: A Computer Security Proffesional's Guide to Malicious Code» by
Michael Erbschloe [
Abstract]
«
The True Computer Parasite» by
Steven Furnell,
Jeremy Ward [
Abstract]
23.68Kb«
The Universal Viral Machine: Bits, Parasites and the Media Ecology of Network Culture» by
Jussi Parikka [
Abstract]
75.41Kb«
Viral Noise and the (Dis)Order of the Digital Culture» by
Jussi Parikka 15.64Kb«
The Virtual Artaud: Computer Virus as Performance Art» by
Jason Farman [
Abstract]
26.01Kb«
Viruses 101» by
John Aycock,
Ken Barker [
Abstract]
25.93Kb«
Viruses: That Intricate Yarn» by
Roberta Buiani [
Abstract]
35.78Kb«
Wikipedia: Using free knowlegde for bad stuff» by
SPTH [
Abstract]
11.25Kb2004
«
64-bit rugrats» by
Peter Ferrie,
Péter Ször [
Abstract]
12.65Kb«
Cabirn fever» by
Peter Ferrie,
Péter Ször [
Abstract]
6.44Kb«
Capture the desktop - scan .LNK files for victims» by
DiA [
Abstract]
24.6Kb«
Chiba witty blues» by
Peter Ferrie,
Frédéric Perriot,
Péter Ször [
Abstract]
10.26Kb«
Code via Behaviour» by
SPTH [
Abstract]
9.97Kb«
The Computer Virus Culture» by
Jamie Mitchell [
Abstract]
7.06Kb«
Defense and Detection Strategies against Internet Worms» by
Jose Nazario [
Abstract]
630.04Kb«
Details Emerge on the First Windows Mobile Virus» by
Cyrus Peikari,
Seth Fogie,
Ratter [
Abstract]
43.5Kb«
Detecting Complex Viruses» by
Peter Ferrie,
Frédéric Perriot [
Abstract]
11.5Kb«
Detection of New Malicious Code Using N-grams Signatures» by
Tony Abou-Assaleh,
Nick Cercone,
Vlado Keselj,
Ray Sweidan [
Abstract]
31.53Kb«
The Evolution of Viruses and Worms» by
Thomas Chen,
Jean-Marc Robert [
Abstract]
40.75Kb«
Execution redirection thru ‘Image File Execution Options’ key» by
GriYo [
Abstract]
8.62Kb«
Find Victims with FindExecutable API» by
DiA [
Abstract]
6.27Kb«
The future of virus detection» by
Richard Ford [
Abstract]
28.74Kb«
Genetic programming in virus» by
ValleZ [
Abstract]
15.67Kb«
How dumaru?» by
Peter Ferrie [
Abstract]
27.21Kb«
How to break the rules with the class libraries» by
roy g biv [
Abstract]
16.72Kb«
Implementing genetic algorithms in virusses» by
BlueOwl [
Abstract]
12.7Kb«
Imposing Order on Program Statements to Assist Anti-Virus Scanners» by
Arun Lakhotia,
Moinuddin Mohammed [
Abstract]
42.22Kb«
Injected Evil (executable files infection)» by
Z0mbie [
Abstract]
9.21Kb«
Is virus writing really that bad?» by
Paul Ducklin [
Abstract]
23.87Kb«
Join us now and share the malware...» by
zert [
Abstract]
49.75Kb«
Let them eat brioche» by
Peter Ferrie [
Abstract]
6.79Kb«
Look at that escargot» by
Peter Ferrie [
Abstract]
6.61Kb«
MenuetOS infection» by
SPTH [
Abstract]
31.15Kb«
Mostly harmless» by
Peter Ferrie,
Frédéric Perriot [
Abstract]
16.23Kb«
MSIL-PE-EXE infection strategies» by
Benny [
Abstract]
10.1Kb«
MyDoom and You» by
Richard Stallman [
Abstract]
3.91Kb«
New IRC spreading» by
SPTH [
Abstract]
8.16Kb«
NOTE Segment Infection technique» by
Cyneox [
Abstract]
4.29Kb«
NtVDM under WinNT/2k/XP» by
Ratter [
Abstract]
8.44Kb«
Past, Present and Future of Batch» by
SPTH [
Abstract]
10.67Kb«
Per-process residency review: common mistakes» by
Bumblebee [
Abstract]
10.28Kb«
Pervert world wide» by
Z0mbie [
Abstract]
2.64Kb«
Polymorphic Compilation (just some crazy thoughts)» [
Abstract]
6.94Kb«
Ring0 under WinNT/2k/XP» by
Ratter [
Abstract]
14.08Kb«
RUBY Virus Writing Guide» by
SPTH [
Abstract]
35.18Kb«
The Secure Virus-Copy» by
SPTH [
Abstract]
8.29Kb«
Server -> Client Communtication for Preprocessor languages (PHP)» by
SPTH [
Abstract]
5.7Kb«
SFP revisited» by
Ratter [
Abstract]
6.54Kb«
Solving Plain Strings Problem In HLL» by
Z0mbie [
Abstract]
13.43Kb«
Some Further Theoretical Results about Computer Viruses» by
Zhihong Zuo,
Mingtian Zhou [
Abstract]
41.79Kb«
Static linked ELF infecting» by
Ares [
Abstract]
10.26Kb«
Strong Cryptography Armoured Computer Viruses Forbidding Code Analysis: the BRADLEY virus» by
Eric Filiol [
Abstract]
32.91Kb«
Technological Networks and the Spread of Computer Viruses» by
Justin Balthrop,
Stephanie Forrest,
M. Newman,
Matthew Williamson [
Abstract]
13.82Kb«
To catch Efish» by
Peter Ferrie,
Frédéric Perriot [
Abstract]
11.1Kb«
Up to Date with the URLDownloadToFileA API» by
DiA [
Abstract]
11.51Kb«
A Virus in Info-Space: the open network and its enemies» by
Tony Sampson 14.02Kb«
Virus Payloads - History and Payload Mentality» by
Rott_En [
Abstract]
14.04Kb«
The Virus Underground» by
Clive Thompson [
Abstract]
43.51Kb«
Visualizing Windows Executable Viruses Using Self-Organizing Maps» by
InSeon Yoo [
Abstract]
27.89Kb«
VMware has you» by
Z0mbie [
Abstract]
1.79Kb«
The wormpipe strikes back» by
Peter Ferrie,
Frédéric Perriot [
Abstract]
19.09Kb«
A Worst-Case Worm» by
Nicholas Weaver,
Vern Paxson [
Abstract]
46.24Kb«
Your favorites, my victims - .url infection in JavaScript» by
DiA [
Abstract]
7.9Kb2003
«
Alfred Bester Is Alive and Well and Living in Winterset, Iowa» by
Bret Bertholf [
Abstract]
49.43Kb«
Blast off!» by
Peter Ferrie,
Frédéric Perriot,
Péter Ször [
Abstract]
8.87Kb«
Challenges in getting 'formal' with viruses» by
Arun Lakhotia,
Prabhat Singh [
Abstract]
24.03Kb«
Convergence of Virus Writers and Hackers: Fact or Fantasy?» by
Sarah Gordon,
Qingxiong Ma [
Abstract]
41.49Kb«
A Critical Look at the Regulation of Computer Viruses» by
Mathias Klang [
Abstract]
62.36Kb«
Cross Infection in JavaScript» by
SPTH [
Abstract]
16.76Kb«
The ELF Virus Writing HOWTO» by
Alexander Bartolich [
Abstract]
«
Exotic Morphing Techniques In JavaScript» by
SPTH [
Abstract]
25.26Kb«
A Failure to Learn from the Past» by
Eugene Spafford [
Abstract]
79.41Kb«
How to encrypt JavaScript viriis?» by
SPTH [
Abstract]
4.87Kb«
ICQ visions» by
Benny [
Abstract]
5.54Kb«
Implementing and testing a virus throttle» by
Jamie Twycross,
Matthew Williamson [
Abstract]
40.54Kb«
Infecting loadable kernel modules» by
truff [
Abstract]
38.86Kb«
Invisibility on NT boxes, How to become unseen on Windows NT (Version: 1.2)» by
Holy_Father [
Abstract]
50.49Kb«
Kolmogorov Complexity Estimates For Detection Of Viruses In Biologically Inspired Security Systems: A Comparison With Traditional Approaches» by
Sanjay Goel,
Stephen Bush [
Abstract]
99.08Kb«
Looking a Bagift-Horse in the Mouth» by
Peter Ferrie,
Frédéric Perriot [
Abstract]
10.73Kb«
PHP Virus Writing Guide» by
SPTH [
Abstract]
37.23Kb«
Polymorphism in BatXP» by
SPTH [
Abstract]
9.86Kb«
Polymorphism in JavaScript» by
SPTH 30.44Kb«
Recent Worms: A Survey and Trends» by
Darrell Kienzle,
Matthew Elder [
Abstract]
54.56Kb«
Reliable Identification of Bounded-length Viruses is NP-complete» by
Diomidis Spinellis [
Abstract]
26.2Kb«
Should We Teach Virus Writing?» by
Vesselin Bontchev [
Abstract]
47.25Kb«
Sleep-Inducing» by
Peter Ferrie [
Abstract]
10.92Kb«
Sobig, sobigger, sobiggest» by
Peter Ferrie [
Abstract]
27.32Kb«
Superworms and Cryptovirology: a Deadly Combination» by
Ivan Balepin [
Abstract]
28.75Kb«
A Taxonomy of Computer Worms» by
Nicholas Weaver,
Vern Paxson,
Stuart Staniford,
Robert Cunningham [
Abstract]
45.5Kb«
Useful things in Batch» by
SPTH [
Abstract]
7.66Kb«
Useful things in JavaScript» by
SPTH [
Abstract]
14.67Kb«
Viral polymorphism» by
Stephen Pearce [
Abstract]
23.63Kb«
Virus Cryptoanalysis» by
Mircea Ciubotariu [
Abstract]
10.27Kb«
Virus ex machina res ipsa loquitur» by
Meiring De Villiers [
Abstract]
197.82Kb«
Virus writers in the wild» by
Marcia Wilson [
Abstract]
8.16Kb«
Warning: Virus!» by
Dan Grabham [
Abstract]
20.33Kb«
With war near, U.S. raises terror alert level» by
Dan Verton [
Abstract]
3.34Kb«
Worm wars» by
Peter Ferrie,
Frédéric Perriot,
Péter Ször [
Abstract]
15.57Kb«
You've got more M(1**)A(D)I(L+K)L» by
Peter Ferrie [
Abstract]
9.82Kb2002
«
About undetectable viruses» by
Z0mbie [
Abstract]
6.2Kb«
Adding LDT entries in Win2K» by
Z0mbie [
Abstract]
7.11Kb«
Another Computing Platform Gets Its First Virus» by
Brian McWilliams [
Abstract]
2.91Kb«
Applied Cryptanalysis of Cryptosystems and Computer Attacks Through Hidden Ciphertexts Computer Viruses» by
Eric Filiol [
Abstract]
34.27Kb«
The Asexual Virus: Computer Viruses in Feminist Discourse» by
Martina Gillen [
Abstract]
59.87Kb«
Attack of the Clones» by
Peter Ferrie [
Abstract]
9.91Kb«
The biology of digital organisms» by
Claus Wilke,
Christoph Adami [
Abstract]
37.34Kb«
Contagion on the Internet» by
Trudy Wassenaar,
Martin Blase 10.34Kb«
Curious Yellow: The First Coordinated Worm Design» by
Brandon Wiley [
Abstract]
22.03Kb«
Dealing with Metamorphism» by
Myles Jordan [
Abstract]
11.72Kb«
Email networks and the spread of computer viruses» by
Stephanie Forrest,
Justin Balthrop,
M. Newman [
Abstract]
23.73Kb«
Encryption in Perl Viruses» by
SnakeByte [
Abstract]
2.91Kb«
Examples of Malicious Computer Programs» by
Ronald Standler [
Abstract]
95.43Kb«
Gaining important datas from PEB under NT boxes» by
Ratter [
Abstract]
6Kb«
Gaining passwords» by
Ratter [
Abstract]
7.24Kb«
Hooking Windows API: Technics of hooking API functions on Windows» by
Holy_Father [
Abstract]
47.55Kb«
Hooking WinNT/2K/XP API v0.01» by
Z0mbie [
Abstract]
2.64Kb«
How AVs Detect Viruses» [
Abstract]
15.68Kb«
Impersonation, your friend» by
Ratter [
Abstract]
5.89Kb«
Infecting ISO CD images» by
Z0mbie [
Abstract]
10.24Kb«
Infecting Winlogon» by
Ratter [
Abstract]
4.98Kb«
It Came from Outer Space: The Virus, Cultural Anxiety, and Speculative Fiction» by
Anne-Marie Thomas [
Abstract]
106.11Kb«
Killer Apps» by
Sasha Segan [
Abstract]
8.39Kb«
Language, a virus?» by
Florian Cramer [
Abstract]
13.17Kb«
The Legislative Response to the Evolution of Computer Viruses» by
Mark Colombell 63.48Kb«
Metamorphism in practice or "How I made MetaPHOR and what I've learnt"» by
The Mental Driller [
Abstract]
66.25Kb«
Microsoft .NET Common Language Runtime Overview» by
Benny [
Abstract]
14.69Kb«
Opening NT boxes for you and your comrades in arms» by
Ratter [
Abstract]
4.27Kb«
Perfect Internet-Worm via VisualBasic Script» by
SPTH [
Abstract]
7.55Kb«
Perl EPO Techniques» by
SnakeByte [
Abstract]
6.16Kb«
Polymorphism in Perl Viruses» by
SnakeByte [
Abstract]
5.99Kb«
Protection of Computer Systems from Computer Viruses: Ethical and Practical Issues» by
Bruce Neubauer,
James Harris [
Abstract]
27.57Kb«
Raised hacklez» by
Peter Ferrie [
Abstract]
19.22Kb«
Several things to learn more (knowledge and code snippets)» by
The Mental Driller [
Abstract]
10.51Kb«
Situation in VX scene» by
Benny [
Abstract]
10.05Kb«
Snorting coke (and packets)» by
GriYo [
Abstract]
6.34Kb«
The Social Psychology of Computer Viruses and Worms» by
Jonathan Rusch [
Abstract]
51.53Kb«
Some ideaz about future worm» by
Benny [
Abstract]
3.87Kb«
Some New Ideaz for Future Viruses» by
allegro [
Abstract]
4.63Kb«
Striking Similarities» by
Peter Ferrie,
Frédéric Perriot,
Péter Ször [
Abstract]
11.64Kb«
Techniques a worm might use to be harder to locate» by
One Semicolon [
Abstract]
37.64Kb«
Un combate con el Kerñado» by
Peter Ferrie [
Abstract]
9.75Kb«
Unexpected Resutls [sic]» by
Peter Ferrie [
Abstract]
9.33Kb«
A unified prediction of computer virus spread in connected networks» by
Lora Billings,
William Spears,
Ira Schwartz [
Abstract]
25.11Kb«
UNIX SH and BASH shell viruses» by
Gobleen Warrior [
Abstract]
33.91Kb«
The Viral Mind: Understanding the Motives of Malicious Coders» by
D. D. Shelby [
Abstract]
16.43Kb«
Virii Generators: Understanding the Threat» by
James Tarala 33.87Kb«
The virmaking is dying» by
Z0mbie [
Abstract]
2.07Kb«
Virus Juice: squeezing bash to get it, another little shell script virus tutorial» by
zert [
Abstract]
58.29Kb«
Viruses: a concern for all of us» by
Christophe Blaess [
Abstract]
41.08Kb«
What's in a Name?» by
Sarah Gordon [
Abstract]
13.13Kb«
Win2k.SFPDisable» by
Benny,
Ratter [
Abstract]
8.43Kb«
You've got M(1**)a(D)i(L+K)l» by
Peter Ferrie [
Abstract]
10.38Kb2001
«
Anatomy of Malice» by
Stephen Cass [
Abstract]
20.8Kb«
Comment on 'A Framework for Modelling Trojans and Computer Virus Infection'» by
Erkki Makinen [
Abstract]
11.84Kb«
Computer Virus» by
Nancy Kress [
Abstract]
100.79Kb«
Disassemblers within viruses» by
Z0mbie [
Abstract]
14.61Kb«
Formulas for Random Number Generators» by
The Mental Driller [
Abstract]
13.24Kb«
Future Viruses and Operating System Development» by
nucleii [
Abstract]
33.06Kb«
Generally about VX scene (from the psychedelic point of view)» by
Benny [
Abstract]
4.83Kb«
How Viruses Spread among Computers and People» by
Alun Lloyd,
Robert May [
Abstract]
10.71Kb«
Hunting for metamorphic» by
Peter Ferrie,
Péter Ször [
Abstract]
54.54Kb«
I.T. IN PRACTICE: Computer viruses» by
Adam Reynolds [
Abstract]
5.67Kb«
Infecting Compilers» by
Silent Supporter [
Abstract]
2.21Kb«
Interview with Cyclone» by
T-2000 5.31Kb«
Interview with Dark Fiber» by
T-2000 4.52Kb«
Interview with Sarah Gordon» by
Gigabyte 8.08Kb«
Interview with SennaSpy» by
T-2000 4.25Kb«
Interview with SnakeByte» by
Necronomikon 8.12Kb«
Interview with Stormbringer» by
T-2000 17.09Kb«
Interview with Toro» by
T-2000 5.62Kb«
Interview with Ultras» by
T-2000 8.46Kb«
Interview with with Doctor Owl» by
Necronomikon 9.54Kb«
Introduction to Randomly Evolving Machinecode» by
Tom Van Braeckel [
Abstract]
28.49Kb«
Linux Worms - some ideas» by
SnakeByte [
Abstract]
10.13Kb«
Macro-Viruses: Genesis, Truth about the Threat and Methods of Protection» by
Andy Nikishin,
Mike Pavluschik,
Denis Zenkin [
Abstract]
18.74Kb«
Magisterium Abraxas» by
Peter Ferrie [
Abstract]
10.87Kb«
Malicious Mobile Code: Virus Protection for Windows» by
Roger Grimes [
Abstract]
«
Marketing Virus: The new age of malixious programs» by
Silent Supporter [
Abstract]
5.86Kb«
Modern operating systems» by
Andrew Tanenbaum [
Abstract]
58.13Kb«
Modular worms» by
Viktor Grichenko [
Abstract]
22.98Kb«
A Plague of Viruses: Biological, Computer and Marketing» by
Jeffrey Boase,
Barry Wellman [
Abstract]
49.27Kb«
Prosecuting Computer Virus Authors: The Need for an Adequate and Immediate International Solution» by
Kelly Cesare [
Abstract]
146.3Kb«
Reductions of the general virus detection problem» by
Ferenc Leitold [
Abstract]
16.78Kb«
Reply to `Comment on "A Framework for Modelling Trojans and Computer Virus Infection"' by E. Mäkinen» by
Harold Thimbleby,
Stuart Anderson,
Paul Cairns [
Abstract]
11.41Kb«
Reply to `Comment on "A Framework for Modelling Trojans and Computer Virus Infection"' by E. Mäkinen» by
Fred Cohen [
Abstract]
7.13Kb«
SirCamstantial Evidence» by
Peter Ferrie,
Péter Ször [
Abstract]
13.54Kb«
The urge of creation» by
Asmodeus [
Abstract]
9.43Kb«
Viral Bodies, Virtual Practices» by
Monica Hulsbus [
Abstract]
30.72Kb«
Viruses Are Not Speech» by
Michel Kabay [
Abstract]
3.1Kb«
Viruses Revealed: Understanding and Counter Malicious Software» by
David Harley,
Robert Slade,
Urs Gattiker [
Abstract]
1.34Mb«
You, Too, Can Write an Anna Worm» by
Michelle Delio [
Abstract]
6.96Kb«
Zmist Opportunities» by
Peter Ferrie,
Péter Ször [
Abstract]
11.45Kb2000
«
"DELAYED CODE" technology (version 1.1)» by
Z0mbie [
Abstract]
11.28Kb«
Advanced polymorphic engine construction» by
The Mental Driller [
Abstract]
38.16Kb«
Antivirus Software Testing for the New Millenium» by
Sarah Gordon,
Howard Fraser [
Abstract]
42.3Kb«
Are Anti-Virus Companies Criminals?» by
SnakeByte [
Abstract]
4.1Kb«
Asmodeus takes a look into the crystal ball» by
Asmodeus [
Abstract]
2.34Kb«
Automated reverse engineering: Mistfall engine» by
Z0mbie [
Abstract]
17.12Kb«
Automatically generated Win32 heuristic virus detection» by
William Arnold,
Gerald Tesauro [
Abstract]
31.08Kb«
Can cryptography prevent computer viruses?» by
John Morar,
David Chess [
Abstract]
36.79Kb«
A Day in the Life of an Anti-Virus Lab» by
Robert Vibert [
Abstract]
14.73Kb«
Description of the win98/INT 2E services (VMM/NTKERN.VxD)» by
Z0mbie 44.22Kb«
E-mail Virus Protection Handbook» by
James Stanger [
Abstract]
«
Entering Ring-0 Using Win32 Api: Context Modification» by
Z0mbie [
Abstract]
5.77Kb«
EPO techniques under Win32» by
Benny [
Abstract]
6.4Kb«
EPO: Entry-Point Obscuring» by
GriYo [
Abstract]
16.43Kb«
The Evolution of 32-Bit Windows Viruses» by
Péter Ször,
Eugene Kaspersky 17.16Kb«
EXPLORER in-memory infection» by
GriYo [
Abstract]
25.46Kb«
A few ideas for viruses» by
Kalkin/EViL [
Abstract]
9.61Kb«
Flexible Infections: Computer Viruses, Human Bodies, Nation-States, Evolutionary Capitalism» by
Stefan Helmreich [
Abstract]
59.28Kb«
How to make infected system to depend on the virus» by
Prizzy [
Abstract]
32.36Kb«
I.Danilov vs V.Bogdanov (Dr.Web vs AVP): Programmer's Competition» by
Z0mbie [
Abstract]
18.52Kb«
An Introduction to Encryption, Part III (Is an impenetrable encryption possible?)» by
MidNyte 8.01Kb«
Mathematical Model of Computer Viruses» by
Ferenc Leitold [
Abstract]
«
Metamorphism» by
Lord Julus [
Abstract]
27.25Kb«
Metamorphism (part 1)» by
Z0mbie 30.45Kb«
The protector scene» by
Kalkin/EViL [
Abstract]
3.22Kb«
Retro the easy way» by
MidNyte [
Abstract]
3.97Kb«
The Scarred Man» by
Gregory Benford [
Abstract]
44.77Kb«
Secrets & Lies: Digital Security in a Networked World (excerpt)» by
Bruce Schneier [
Abstract]
20.06Kb«
Some human dimensions of computer virus creation and infection» by
Andy Bisset,
Geraldine Shipton [
Abstract]
52.33Kb«
Some politically incorrect words about the so-called "scene"» by
Spanska [
Abstract]
15.34Kb«
Tracing under Win32» by
Z0mbie 7.06Kb«
An Undetectable Computer Virus» by
David Chess,
Steve White [
Abstract]
19.54Kb«
Virus DATabase» by
Cicatrix [
Abstract]
«
Virus Writers: The End of The Innocence?» by
Sarah Gordon [
Abstract]
65.45Kb«
Viruses and the Law: Why the Law is Ineffective» by
John Montana [
Abstract]
14.18Kb«
What is Wild?» by
Sarah Gordon [
Abstract]
52.32Kb«
Why a "good" virus is good idea» by
VirusBuster [
Abstract]
8.88Kb«
Win2K infection» by
GriYo [
Abstract]
8.66Kb«
Win32 Viral Networking Overwiew» by
GriYo [
Abstract]
26Kb«
Worms and Viruses: A little essay» by
SnakeByte [
Abstract]
4.37Kb«
Writing into kernel from ring-3: Lets fuck pagetable» by
Z0mbie [
Abstract]
15.04Kb1999
«
"Do polymorphism" tutorial» by
Wintermute [
Abstract]
15.91Kb«
32 bit optimization» by
Billy Belcebú [
Abstract]
13.1Kb«
ACG in the Hole» by
Adrian Marinescu [
Abstract]
10.85Kb«
AMCW - A New Weapon for the New Millennium» by
Sung Yang [
Abstract]
17.6Kb«
Anti-debugging in Win32» by
Lord Julus [
Abstract]
12.49Kb«
Argument For A 'Good' Virus» by
MidNyte [
Abstract]
28.8Kb«
The Art of Virii Collecting» by
Tally [
Abstract]
41.56Kb«
Assembly language or HLL?» by
Navrhar [
Abstract]
6.93Kb«
Blindingly» by
MidNyte [
Abstract]
8.33Kb«
A brief history of virii vs. antivirii war» by
flush [
Abstract]
48.55Kb«
Communicating Viruses» by
Changeling [
Abstract]
5.39Kb«
The Complete Re-write Engine» by
MidNyte [
Abstract]
13.48Kb«
Computer Parasitology» by
Carey Nachenberg [
Abstract]
96.5Kb«
Edinburgh University PC Virus Review 1999»
17.01Kb«
ELF executable reconstruction from a core image» by
Silvio Cesare [
Abstract]
6.09Kb«
A framework for modelling trojans and computer virus infection» by
Harold Thimbleby,
Stuart Anderson,
Paul Cairns [
Abstract]
93.55Kb«
The Future of Malware» by
Stephen Trilling,
Carey Nachenberg [
Abstract]
67.82Kb«
Future waits for your viruses» by
flush [
Abstract]
6.92Kb«
Harder to detect (theory)» by
Billy Belcebú [
Abstract]
11.02Kb«
Heuristic Technology» by
Billy Belcebú [
Abstract]
6.52Kb«
How to become the world's richest man» by
MidNyte [
Abstract]
1.46Kb«
How to link a library to a VBProject» by
jack twoflower [
Abstract]
2.31Kb«
I will survive...» by
Changeling [
Abstract]
7.1Kb«
Interview with Benny/29A» [
Abstract]
17.57Kb«
Interview with Cicatrix» [
Abstract]
12.7Kb«
Interview with Duke» [
Abstract]
12.17Kb«
Interview with Lovin God» by
SeptiC [
Abstract]
10.52Kb«
Interview with person from AV company» [
Abstract]
16.14Kb«
Interview with SMT» by
Cicatrix 6.34Kb«
An Introduction to Encryption, Part I» by
MidNyte [
Abstract]
13.41Kb«
An Introduction to Encryption, Part II» by
MidNyte [
Abstract]
19.07Kb«
Is Java still secure?» by
David Chess,
John Morar [
Abstract]
33.02Kb«
Kernel function hijacking» by
Silvio Cesare [
Abstract]
2.5Kb«
Linux anti-debugging techniques (fooling the debugger)» by
Silvio Cesare [
Abstract]
5.55Kb«
Linux virus writing tutorial» by
mandragore [
Abstract]
15.8Kb«
Movement of Viruses» by
Sung Yang [
Abstract]
5.76Kb«
A Note On High Integrity PC Bootstrapping» by
Fred Cohen [
Abstract]
15.62Kb«
Notes from the virus Underground...» by
Kim Neely [
Abstract]
29.76Kb«
Other techniques of polymorphism» by
flush,
MGL [
Abstract]
8.36Kb«
Outside people» by
Slagehammer [
Abstract]
3.28Kb«
Permission to infect, sir?» by
MidNyte [
Abstract]
3.38Kb«
Perusing The Virus Author Mentality» by
Lord Julus [
Abstract]
10.98Kb«
Phunny stuff with your cursor» by
jack twoflower [
Abstract]
6.65Kb«
Polymorphism - A Discussion Of Methodology And Implementation» by
Buz [
Abstract]
21Kb«
Polymorphism and grammars» by
Wintermute [
Abstract]
21.82Kb«
Polymorphism: Level 6B (Polymorphism: Chaotic Permutations)» by
Changeling [
Abstract]
10.17Kb«
A Radical New Approach to Virus Scanning» by
Joe Wells [
Abstract]
111.14Kb«
Scanners of The Year 2000: Heuristics» by
Dmitry Gryaznov [
Abstract]
37.23Kb«
Shared library call redirection using ELF PLT infection» by
Silvio Cesare [
Abstract]
33.36Kb«
The short monologue of virus Wendell from his small 120 megabytes world» by
Int13h [
Abstract]
12.65Kb«
Some stuff» by
Lord Julus [
Abstract]
8.67Kb«
SysCall redirection without modifying the SysCall table» by
Silvio Cesare [
Abstract]
2.38Kb«
Tricks to make your macro virus unscannable» by
jack twoflower [
Abstract]
10.45Kb«
Unix viruses» by
Silvio Cesare [
Abstract]
49.59Kb«
Using Structured Exception Handler (SEH)» by
Billy Belcebú [
Abstract]
3.54Kb«
Viric life and die theories» by
Billy Belcebú [
Abstract]
12.75Kb«
Viruses under LiNUX» [
Abstract]
70.97Kb«
The VxDCall backdoor» by
GriYo [
Abstract]
25.09Kb«
When Worlds Collide: Information Sharing for the Security and Anti-virus Communities» by
Sarah Gordon,
Richard Ford [
Abstract]
50.54Kb«
Why I write viruses (and how not to stop me)» by
MidNyte [
Abstract]
5.18Kb«
Why Viruses are necessary» by
J. S. Bach [
Abstract]
3.7Kb«
Why writing viruses?» by
n0ph [
Abstract]
3.05Kb«
Windows - where?» by
Lord Julus [
Abstract]
5.85Kb1998
«
Accessing Windows 95 API's by scanning PE-tables» by
Lord Julus [
Abstract]
26.63Kb«
Anti-Debugger & Anti-Emulator Lair» by
Lord Julus [
Abstract]
63.54Kb«
The Anti-Virus Cook Book v1.5» by
Kurt Wismer [
Abstract]
41.28Kb«
Artificial intelligence and viruses» by
J. S. Bach [
Abstract]
18.27Kb«
Concepts of cooperation in artificial life» by
Harold Thimbleby,
Ian Witten,
David Pullinger [
Abstract]
41.9Kb«
Conflict and the Computer: Information Warfare and Related Ethical Issues» by
Sam Nitzberg [
Abstract]
30.08Kb«
Edinburgh University PC Virus Review 1998»
12.84Kb«
HMA Residency» by
"Q" the Misanthrope [
Abstract]
15.71Kb«
Interview with Jerk1n» by
FoxZ [
Abstract]
4.17Kb«
Interview with Mikee» by
FoxZ [
Abstract]
4.42Kb«
Interview with Nucleii» by
Knowdeth [
Abstract]
6.56Kb«
Interview with Trigger» by
Slam [
Abstract]
7.43Kb«
Little SYS Infection Tutorial» by
Int13h [
Abstract]
10.31Kb«
Macro virus identification problems» by
Vesselin Bontchev [
Abstract]
82.14Kb«
Mid-Infection on relocations» by
b0z0 [
Abstract]
24.32Kb«
Open Problems in Computer Virus Research» by
Steve White [
Abstract]
40.95Kb«
Piggyback» by
Kernel Panik [
Abstract]
7.08Kb«
Playing 'Hide and Seek'» by
"Q" the Misanthrope [
Abstract]
11.67Kb«
Polymorphism - Analysis on the decryptor generator 1.5» by
Lord Julus [
Abstract]
63.29Kb«
Principles of a Computer Immune System» by
Anil Somayaji,
Steven Hofmeyr,
Stephanie Forrest [
Abstract]
33.75Kb«
Protected Mode Supervisor?» by
Igor Daniloff [
Abstract]
15.92Kb«
Runtime kernel kmem patching» by
Silvio Cesare [
Abstract]
29.39Kb«
Security in Agent Systems» by
David Chess [
Abstract]
21.81Kb«
Unix ELF parasites and virus» by
Silvio Cesare [
Abstract]
34.86Kb«
Use of an "Attenuated" Computer Virus as a Mechanism for Teaching Epidemiology» by
Gail Snitkoff,
Dudley Moon,
Mark Smith [
Abstract]
17.41Kb«
Virus oriented VxD writing tutorial» by
GriYo [
Abstract]
20.75Kb«
Where There's Smoke, There's Mirrors: The Truth about Trojan Horses on the Internet» by
David Chess,
Sarah Gordon [
Abstract]
80.65Kb«
The worm has turned» by
Sarah Gordon [
Abstract]
14.96Kb1997
«
Anarchy in the USSR» by
Igor Daniloff [
Abstract]
13.47Kb«
Blueprint for a Computer Immune System» by
Jeffrey Kephart,
Gregory Sorkin,
Morton Swimmer,
Steve White [
Abstract]
54.32Kb«
Computer Immunology» by
Stephanie Forrest,
Steven Hofmeyr,
Anil Somayaji [
Abstract]
33.64Kb«
Computer Virus-Antivirus Coevolution» by
Carey Nachenberg [
Abstract]
29.05Kb«
Computer Viruses and the Human Mind» by
Robin Robertson [
Abstract]
39.46Kb«
Computer-Generated Life» by
Eric Olson [
Abstract]
31.12Kb«
Edinburgh University PC Virus Review 1997»
17.62Kb«
FAT32 New Problems for Anti-Virus, or Viruses? (version 1.01)» by
Martin Overton [
Abstract]
69.77Kb«
Fighting Computer Viruses» by
Jeffrey Kephart,
Gregory Sorkin,
David Chess,
Steve White [
Abstract]
25.18Kb«
Fighting Talk» by
Igor Daniloff [
Abstract]
15.79Kb«
The Future of Viruses on the Internet» by
David Chess [
Abstract]
18.42Kb«
A guide to multipartite infectors 1.5» by
Lord Julus [
Abstract]
40.82Kb«
The Halftime Ass-chewing» by
Horny Toad [
Abstract]
3.65Kb«
A History Of Computer Viruses - Introduction» by
Harold Highland [
Abstract]
13.02Kb«
A History Of Computer Viruses - The Famous `Trio'» by
Harold Highland [
Abstract]
47.08Kb«
A History Of Computer Viruses: Three Special Viruses» by
Harold Highland [
Abstract]
29.82Kb«
Hoaxes & Hypes» by
Sarah Gordon,
Joe Wells [
Abstract]
38.71Kb«
Interview with Coke» [
Abstract]
6.32Kb«
Interview with Eternal Maverick» by
Cicatrix 6.22Kb«
Interview with Stefan Kurtzhals» by
Nightmare Joker [
Abstract]
8.31Kb«
Interview with Wildworker» [
Abstract]
3.18Kb«
Macro virus trickz» by
Jacky Qwerty [
Abstract]
15.23Kb«
No War Machine» by
Stuart Moulthrop [
Abstract]
63.77Kb«
PE Infection school» by
JHB [
Abstract]
5.92Kb«
The Regulation of Virus Research and the Prosecution for Unlawful Research?» by
Alistair Kelman [
Abstract]
13.09Kb«
Sterling vs. Virus Writers» by
Bruce Sterling 6.46Kb«
Veni, Vidi, Vicis?» by
Vesselin Bontchev [
Abstract]
12.68Kb«
Virus» by
Bill Buchanan 697.72Kb«
The Virus Creation Labs» by
Horny Toad [
Abstract]
4.64Kb«
Virus Culture» by
Jeffrey Weinstock [
Abstract]
37.57Kb«
When Java Was One: Threats From Hostile Byte Code» by
Mark Ladue [
Abstract]
30.23Kb1996
«
The Animal Episode» by
John Walker [
Abstract]
18.06Kb«
ANTI-Anti-Virus Tricks Version 1.00» by
MnemoniX [
Abstract]
17.93Kb«
Argument for slow infection and slow polymorphism» by
Rogue Warrior [
Abstract]
7.54Kb«
Autonomous Mobile Cyber Weapon» by
Sung Yang [
Abstract]
33.37Kb«
AVP 2.2 naked» by
Mister Sandman [
Abstract]
7.22Kb«
Becoming Positive» by
Sadie Plant 12.41Kb«
Chilling Fridrik» by
Blade Runner [
Abstract]
2.65Kb«
Computational Brittleness and Evolution in Machine Language» by
Paul-Michael Agapow [
Abstract]
26.07Kb«
Cryptovirology: Extortion-Based Security Threats and Countermeasures» by
Adam Young,
Moti Young [
Abstract]
64.55Kb«
Edinburgh University PC Virus Review 1996»
8.39Kb«
The Future Impact of Viruses» by
David Emm [
Abstract]
7.83Kb«
The Generic Virus Writer II» by
Sarah Gordon [
Abstract]
44.2Kb«
Guide to improving Polymorphic Engines» by
Rogue Warrior [
Abstract]
17.61Kb«
Infecting People - A Moral Issue?» by
Liquid Jesus [
Abstract]
12.16Kb«
The Little Black Book of Computer Viruses» by
Mark Ludwig [
Abstract]
215.15Kb«
The macro virus writing tutorial» by
Dark Night 12.67Kb«
Mutation Engines» by
JHB [
Abstract]
8.14Kb«
Naming your Viruses» by
Rajaat [
Abstract]
10.2Kb«
Neural Networks for Computer Virus Recognition» by
Gerald Tesauro,
Jeffrey Kephart,
Gregory Sorkin [
Abstract]
7.41Kb«
Possible Virus Attacks Against Integrity Programs And How To Prevent Them» by
Vesselin Bontchev [
Abstract]
56.66Kb«
Preserving Infections» by
Sepultura [
Abstract]
17.25Kb«
Productivity, Technology and AntiVirus Industry» by
Sung Yang [
Abstract]
29.86Kb«
A Sense of Self for Unix Processes» by
Stephanie Forrest,
Steven Hofmeyr,
Anil Somayaji,
Thomas Longstaff [
Abstract]
47.66Kb«
Stalking a Computer Virus» by
Wallace Wang [
Abstract]
9.03Kb«
Tunneling with Code Tracing» by
Methyl [
Abstract]
71.26Kb«
Tunneling with Single step mode» by
Methyl [
Abstract]
53.79Kb«
The UNDERGROUND MS WORD 6.x MACRO VIRUSES FAQ V2.0» by
Aurodreph 24.06Kb«
Understanding and Managing Polymorphic Viruses» by
Carey Nachenberg [
Abstract]
19.68Kb«
VBA viruses and trojans» by
Leugim San 10.52Kb«
Virus attacks can come from strange places» by
Timothy Barmann 6.44Kb«
A Web of Detection» by
Keith Jackson [
Abstract]
13.58Kb«
Why Viruses Are and Always will be a Problem» by
Richard Ford [
Abstract]
12.19Kb1995
«
'Vircing' the InVircible» by
Vesselin Bontchev [
Abstract]
157.42Kb«
The Anti-Virus Strategy System» by
Sarah Gordon [
Abstract]
33.44Kb«
Are Good Virus Simulators Still a Bad Idea?» by
Sarah Gordon [
Abstract]
28.59Kb«
Batch Viruses (second issue)» by
Wavefunc [
Abstract]
13.13Kb«
Batch Viruses (third issue)» by
Wavefunc 16.08Kb«
Biologically Inspired Defenses Against Computer Viruses» by
Jeffrey Kephart,
Gregory Sorkin,
William Arnold,
David Chess,
Gerald Tesauro,
Steve White [
Abstract]
66.15Kb«
Boot Infectors» by
Dark Angel [
Abstract]
11.85Kb«
A brand new way to fool TBScan» by
Automag [
Abstract]
1.67Kb«
Computer Viruses - Legal Options» by
Bernard Zajac [
Abstract]
6.73Kb«
Computer Viruses In Unix Networks» by
Peter Radatti [
Abstract]
36.84Kb«
Computer Viruses: A Global Perspective» by
Steve White,
Jeffrey Kephart,
David Chess [
Abstract]
50.91Kb«
Dynamic detection and classification of computer viruses using general behaviour patterns» by
Baudouin Le Charlier,
Morton Swimmer,
Abdelaziz Mounji [
Abstract]
43.76Kb«
Edinburgh University PC Virus Review 1995»
17.51Kb«
The Giant Black Book of Computer Viruses» by
Mark Ludwig 748.76Kb«
Modern Methods of Detecting and Eradicating Known and Unknown Viruses» by
Dmitry Mostovoy [
Abstract]
12.04Kb«
Morality and Technology, or Is it Wrong to Create and Let Loose a Computer Virus» by
Urs Gattiker,
Helen Kelley [
Abstract]
57.67Kb«
Origin of the Cookie Monster» by
Chris Tavares [
Abstract]
3.38Kb«
Overwriting virus tutorial #1» by
RatBoy [
Abstract]
11.12Kb«
Post discovery strategies» by
Sepultura [
Abstract]
36.14Kb«
Single Stepping Tunnel Techniques» by
Dark Fiber 21.41Kb«
TBMEM FLAWS» by
Darkman [
Abstract]
8.35Kb«
Thunderbyte Residency Test» by
Rhincewind [
Abstract]
2.31Kb«
UMB Residency» by
Dark Angel [
Abstract]
5.69Kb«
VIRETHIC. Viral Morality: A Call for Discussion» by
Robert Slade [
Abstract]
22.71Kb«
Viruses Are Good for You» by
Julian Dibbell [
Abstract]
57.45Kb«
Where the Coyotes Roamed: The Fall of the Scene» by
Nemesis [
Abstract]
3.24Kb1994
«
Are 'Good' Computer Viruses Still a Bad Idea?» by
Vesselin Bontchev [
Abstract]
68.83Kb«
Automatic Extraction of Computer Virus Signatures» by
Jeffrey Kephart,
William Arnold [
Abstract]
53.1Kb«
Comments on a paper by Voas, Payne & Cohen: “A model for detecting the existence of software corruption in real time”» by
Peter Ladkin,
Harold Thimbleby [
Abstract]
14.49Kb«
Computer Viruses as Artificial Life» by
Eugene Spafford [
Abstract]
55.29Kb«
Computer Viruses: The Technology and Evolution of an Artificial Life Form» by
Karsten Johansson 316.05Kb«
Document Macro Viruses, Yes, you can spread a virus with a data file...» by
Joel McNamara [
Abstract]
22Kb«
Echoes of Conspiracy» by
FireCracker [
Abstract]
8.6Kb«
Edinburgh University PC Virus Review 1994» [
Abstract]
14.29Kb«
EXE Self-Disinfection» by
Dark Angel [
Abstract]
17.26Kb«
Future Trends in Virus Writing» by
Vesselin Bontchev [
Abstract]
65.58Kb«
The Generic Virus Writer» by
Sarah Gordon [
Abstract]
49.7Kb«
The grand debate about beneficial viruses and artificial life» by
Suzana Stojakovic-Celustka [
Abstract]
6.48Kb«
The Hidden Strengths of the Dos Batch Language» by
Unbekannt [
Abstract]
72.85Kb«
In the trap of the language» by
Suzana Stojakovic-Celustka [
Abstract]
18.3Kb«
An organisational solution to piracy and viruses» by
Harold Thimbleby [
Abstract]
39.15Kb«
A platform independent computer virus» by
Keith Allen McMillan [
Abstract]
51.73Kb«
The results of the Contest for the Best Virus Definition in technical categories» by
Suzana Stojakovic-Celustka [
Abstract]
8.55Kb«
Ripping Source» by
Metabolis [
Abstract]
3.25Kb«
Screwing People Over the Aristotle Style» by
Rock Steady [
Abstract]
8.22Kb«
Technologically Enabled Crime: Shifting Paradigms for the Year 2000» by
Sarah Gordon [
Abstract]
54.77Kb«
The Virus Creation Labs: A Journey into the Underground» by
George Smith [
Abstract]
353.49Kb«
Why Computer Viruses Are Not And Never Were A Problem» by
Sarah Gordon [
Abstract]
33.98Kb1993
«
A "Virus Group" or "Viral Warez?"» by
Nowhere Man [
Abstract]
2.76Kb«
Advanced Polymorphism Primer» by
Dark Angel [
Abstract]
9.53Kb«
Analysis and Maintenance of a Clean Virus Library» by
Vesselin Bontchev [
Abstract]
50.61Kb«
Approaching Zero: The Extraordinary Underworld of Hackers, Phreakers, Virus Writers, And Keyboard Criminals» by
Paul Mungo,
Bryan Glough [
Abstract]
467.72Kb«
Aristotle: "It's a giant pissing contest!" he sez of Vx/A-V» by
George Smith [
Abstract]
2.55Kb«
Atari 8-bit virus» by
Pirx [
Abstract]
8.8Kb«
A Brief History of PC Viruses» by
Alan Solomon [
Abstract]
41.11Kb«
CARO's Undisclosed Illegal Meeting Agenda» by
Rock Steady [
Abstract]
9.04Kb«
CARO's Undisclosed Meeting Agenda» by
ARiSToTLE [
Abstract]
9.12Kb«
Computer Viruses, Artificial Life and Evolution» by
Mark Ludwig 573.34Kb«
Computers and epidemiology» by
Jeffrey Kephart,
David Chess,
Steve White [
Abstract]
34.1Kb«
Disinfecting an Infected File» by
Rock Steady [
Abstract]
11.05Kb«
Edinburgh University PC Virus Review 1993» [
Abstract]
27.96Kb«
The federal government, independent virus researchers and the First Amendment» by
James Lipshultz [
Abstract]
12.72Kb«
Infection on Closing» by
Rock Steady [
Abstract]
17.48Kb«
Inside the Mind of Dark Avenger» by
Sarah Gordon [
Abstract]
18.59Kb«
My Thought on the Proposed Legislation to make Virus Code Illegal in the U.S.A.» by
Matt Miller [
Abstract]
5.78Kb«
Polymorphic Viruses - Implementation, Detection, and Protection» by
Tarkan Yetiser [
Abstract]
13.84Kb«
Self Checking Executable Files» by
Demogorgon [
Abstract]
9.81Kb«
System file tables and their usage» by
Dark Angel [
Abstract]
9.5Kb«
To sara gordon Or Not To sara gordon, That Is The Question» by
Rock Steady [
Abstract]
24.72Kb«
Virus Based Products» by
Fred Cohen [
Abstract]
2.58Kb«
Virus Censorship» by
DecimatoR [
Abstract]
7.67Kb«
Viruses of the Mind» by
Richard Dawkins 49.99Kb1992
«
Are Computer Hacker Break-ins Ethical?» by
Eugene Spafford [
Abstract]
38.17Kb«
Code Optimisation, A Beginner's Guide» by
Dark Angel [
Abstract]
6.19Kb«
The computer virus as a tool of individual empowerment» by
The Flim-Flam Man [
Abstract]
4.18Kb«
Computer viruses and anti-virus warfare» by
Jan Hruska [
Abstract]
521.67Kb«
Computer Viruses: the Inevitability of Evolution?» by
Paul-Michael Agapow [
Abstract]
29.11Kb«
Construction Kit on infecting .COM» by
Rock Steady [
Abstract]
7.04Kb«
Contruction Kit for TSR Virii» by
Rock Steady [
Abstract]
8.46Kb«
Defense-In-Depth Against Computer Viruses» by
Fred Cohen [
Abstract]
69.25Kb«
Dir Stealth Method 2» by
Rock Steady [
Abstract]
4.48Kb«
Directory Stealth» by
Rock Steady [
Abstract]
7.86Kb«
A Discussion of Polymorphism» by
Gary Watson [
Abstract]
9.38Kb«
Edinburgh University PC Virus Review 1992»
28.12Kb«
Establishing ethics in the computer virus arena» by
Paul Ferguson [
Abstract]
12.21Kb«
EXE Infections» by
Rock Steady [
Abstract]
15.48Kb«
A Formal Definition of Computer Worms and Some Related Results» by
Fred Cohen [
Abstract]
41.82Kb«
A Generic Virus Scanner in C++» by
Eugene Spafford,
Sandeep Kumar [
Abstract]
44.89Kb«
History of Computer Viruses» by
Robert Slade [
Abstract]
42.19Kb«
Interview With Data Disruptor» by
Soundmaster 3.59Kb«
An Introduction to Non-Overwriting Virii» by
Dark Angel [
Abstract]
37.97Kb«
Ludwig Shelters Under First Amendment» [
Abstract]
3.04Kb«
Memory Stealth» by
Rock Steady [
Abstract]
3.5Kb«
Mutation Engine Report» by
Tarkan Yetiser [
Abstract]
25.22Kb«
Popp Goes The Weasel» by
Edward Wilding [
Abstract]
9.07Kb«
Scan-strings, how they work and how to avoid them» by
Dark Angel [
Abstract]
7.01Kb«
Snow Crash» by
Neal Stephenson [
Abstract]
908.47Kb«
Virus Detection Alternatives» by
Patrick Min [
Abstract]
37.67Kb«
VIRUSES: What they are, What they do, How they are written (The Virus Writer's Handbook: The Complete Guide)» by
Terminator Z [
Abstract]
94.43Kb«
VX: What the Hell's happened?» by
DecimatoR [
Abstract]
6.91Kb1991
«
The Bulgarian and Soviet Virus Factories» by
Vesselin Bontchev [
Abstract]
56.56Kb«
Can Computer Viruses Be Domesticated to Serve Mankind?» by
John Markoff [
Abstract]
6.98Kb«
A Case for Benevolent Viruses» by
Fred Cohen [
Abstract]
35.47Kb«
A comment on Cohen's theorem about undecidability of viral detection» by
Franz Steinparz [
Abstract]
4.58Kb«
Computer Viruses and Ethics» by
Eugene Spafford [
Abstract]
45.73Kb«
A Cost Analysis of Typical Computer Viruses and Defenses» by
Fred Cohen [
Abstract]
41.79Kb«
Directed-Graph Epidemiological Models of Computer Viruses» by
Jeffrey Kephart,
Steve White [
Abstract]
97.05Kb«
File infecting viri» by
Robert Slade 2.41Kb«
Infection variations» by
Robert Slade 2.71Kb«
A New Virus Naming Convention» by
Fridrik Skulason,
Vesselin Bontchev [
Abstract]
9.51Kb«
An Overview of Computer Viruses in a Research Environment» by
Matt Bishop [
Abstract]
84.01Kb«
The Search for Den Zuk» by
Fridrik Skulason [
Abstract]
7.2Kb«
Synners» by
Pat Cadigan [
Abstract]
939.8Kb«
Trends In Computer Virus Research» by
Fred Cohen [
Abstract]
73.87Kb«
Viral code "association"» by
Robert Slade 2.76Kb«
Viral code addition» by
Robert Slade 2.4Kb«
Viral code insertion» by
Robert Slade 2.26Kb«
Virus Spreading - Fast Or Slow?» by
Nick Haflinger [
Abstract]
3.79Kb«
Virus Verification and Removal Tools and Techniques» by
David Chess [
Abstract]
23.51Kb1990
«
A (long) story about an (old) Apple II virus» by
Joe Dellinger [
Abstract]
13.22Kb«
An Abstract Theory of Computer Viruses» by
Leonard Adleman [
Abstract]
40.82Kb«
The Cuckoo's Egg» by
Cliff Stoll [
Abstract]
722.41Kb«
Hacking Away at the Counterculture» by
Andrew Ross 73.82Kb«
A note on Cohen's formal model for computer viruses» by
Kimmo Kauranen,
Erkki Makinen [
Abstract]
8.41Kb«
A Short Course on Computer Viruses» by
Fred Cohen [
Abstract]
558.4Kb1989
«
The "Father Christmas worm"» by
James Green,
Patricia Sisson [
Abstract]
22.8Kb«
Can hackers be sued for damages caused by computer viruses?» by
Pamela Samuelson [
Abstract]
16.71Kb«
Computational Aspects of Computer Viruses» by
Fred Cohen [
Abstract]
«
Computer virus prevention and containment on mainframes» by
Ghannam Al-Dossary [
Abstract]
39.67Kb«
Computer Viruses and Related Threats: A Management Guide» by
John Wack,
Lisa Carnahan [
Abstract]
92.39Kb«
Computer viruses: Prevention, Detection, and Treatment» by
Mario Tinto [
Abstract]
40.27Kb«
Consensual Realities In Cyberspace» by
Paul Saffo [
Abstract]
10.37Kb«
Coping with Computer Viruses and Related Problems» by
Steve White,
David Chess,
Chengi Kuo [
Abstract]
63.76Kb«
Covert Distributed Processing with Computer Viruses» by
Steve White [
Abstract]
9.03Kb«
An Epidemiology of Viruses & Network Worms» by
Cliff Stoll [
Abstract]
20Kb«
A Hygiene Lesson» by
Bryan Kocher 5.36Kb«
The Impact of Computer Viruses on Society» by
Jimming Lin,
Chia-Hao Chang [
Abstract]
8.4Kb«
The Internet Worm: Crisis and Aftermath» by
Eugene Spafford [
Abstract]
46.39Kb«
Legal Options To Computer Viruses» by
Bernard Zajac [
Abstract]
8.3Kb«
Malicious code: An ethical dilemma» by
Glenn Watt [
Abstract]
22.78Kb«
A Mathematical Theory for the Spread of Computer Viruses» by
Winfried Gleissner [
Abstract]
22.69Kb«
Models of Practical Defenses Against Computer Viruses» by
Fred Cohen [
Abstract]
39.65Kb«
Of worms, viruses and Core War» by
Alexander Dewdney 21.28Kb«
Revenge of the nerds» by
Nicholas Martin [
Abstract]
11.48Kb«
RFC1135: The Helminthiasis of the Internet» by
Joyce Reynolds [
Abstract]
67.09Kb«
Rogue Computer Programs - Viruses, Worms, Trojan Horses and Time Bombs: Prank, Prowess, Protection or Prosecution?» by
Anne Branscomb [
Abstract]
125.02Kb«
There Are No Safe Virus Tests» by
William Dowling [
Abstract]
4.49Kb«
A Tour of the Worm» by
Donn Seeley [
Abstract]
68.37Kb«
Virology 101» by
Douglas McIlroy 15.31Kb«
Viruses and Criminal Law» by
Michael Gemignani 13.82Kb«
With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988» by
Mark Eichin,
Jon Rochlis [
Abstract]
139.28Kb«
The worm that turned: A social use of computer viruses» by
Ian Witten,
Harold Thimbleby [
Abstract]
29.76Kb1988
«
The Application of Epidemiology to Computer Viruses» by
William Murray [
Abstract]
29.7Kb«
COMPUTE!'s computer viruses» by
Ralph Roberts [
Abstract]
333.94Kb«
Computer pranksters plant 'virus' in Macs» by
John Markoff [
Abstract]
4.79Kb«
Computer Systems Under Siege» by
Vin McLellan [
Abstract]
13.18Kb«
Computer viruses (BMJ 296-013)» by
John Asbury [
Abstract]
4.55Kb«
Computer viruses (BMJ 299-66a)» by
John Croall,
Ian McKay [
Abstract]
2.41Kb«
Computer viruses (BMJ 302-66e)» by
John Croall [
Abstract]
2.23Kb«
Computer viruses (BMJ 307-59e)» by
Patrick Harkin [
Abstract]
2.75Kb«
Computer viruses - a high-tech disease» by
Ralf Burger [
Abstract]
466.43Kb«
Does Your Computer Have a Virus?» by
Nikki Finke [
Abstract]
14.53Kb«
Effective and Inexpensive Methods Exist for Controlling Software Viruses» by
Steve Gibson [
Abstract]
4.97Kb«
Ethical Issues in Computer Virus Distribution» by
Fred Cohen [
Abstract]
5.17Kb«
The Executive Computer: A Virus Carries Fatal Complications» by
Peter Lewis [
Abstract]
6.41Kb«
A fault tolerance approach to computer viruses» by
Mark Joseph,
Algirdas Avižienis [
Abstract]
30.36Kb«
Invasion of the Data Snatchers» by
Philip Elmer-DeWitt [
Abstract]
25.82Kb«
On the Implications of Computer Viruses and Methods of Defense» by
Fred Cohen [
Abstract]
61.04Kb«
A Specter Is Haunting Networks - The Specter of Viruses, Hidden in Horses» by
David Buerger [
Abstract]
4.8Kb«
There's A Virus In My Software» by
Philip Hilts [
Abstract]
9.99Kb«
Virus Wars: A Serious Warning» by
John Dvorak [
Abstract]
4.13Kb«
You Must Be Punished» by
Philip Elmer-DeWitt,
Ross Munro [
Abstract]
3.67Kb1987
«
An Approach to Containing Computer Viruses» by
Terence Gray,
Maria Pozzo [
Abstract]
38.66Kb«
Computer (In)security: Infiltrating Open Systems» by
Ian Witten [
Abstract]
83.07Kb«
Computer Viruses: Myth or Reality?» by
Howard Israel [
Abstract]
20.83Kb«
A Cryptographic Checksum for Integrity Protection» by
Fred Cohen [
Abstract]
22.24Kb«
A program called MICE nibbles its way to victory at the first Core War tournament» by
Alexander Dewdney 16.16Kb«
Viral Attacks On UNIX System Security» by
Tom Duff [
Abstract]
28.16Kb1985
«
Alabama Computer Crime Act»
7.34Kb«
A Core War bestiary of viruses, worms and other threats to computer memories» by
Alexander Dewdney 22.44Kb«
A Threat from Malicious Software» by
Jamie Murphy [
Abstract]
6.16Kb1984
«
Business and Commercial Offenses» [
Abstract]
3.91Kb«
Computer Viruses - Theory and Experiments» by
Fred Cohen [
Abstract]
62.59Kb«
In the game called Core War hostile programs engage in a battle of bits» by
Alexander Dewdney 22.76Kb«
Neuromancer» by
William Gibson [
Abstract]
456.97Kb«
Reflections on Trusting Trust» by
Ken Thompson [
Abstract]
10.99Kb1982
«
The "Worm" Programs - Early Experience with a Distributed Computation» by
John Shoch,
Jon Hupp [
Abstract]
40.01Kb«
Joy of reproduction» by
Dennis Ritchie [
Abstract]
1.41Kb1977
«
The Adolescence of P-1» by
Thomas Ryan [
Abstract]
547.42Kb1975
«
The Shockwave Rider» by
John Brunner [
Abstract]
497.3Kb1972
«
Darwin» by
Aleph Null [
Abstract]
9.79Kb«
When Harlie Was One» by
David Gerrold 497.59Kb1971
«
Darwin, a Game of Survival of the Fittest among Programs» by
Douglas McIlroy [
Abstract]
11.22Kb1958
«
Mechanics of Self-reproduction» by
Lionel Sharples Penrose [
Abstract]
38.14Kb1957
«
A Self-reproducing Analogue» by
Lionel Sharples Penrose,
Roger Penrose [
Abstract]
3.71KbUnknown
«
The 'bliem' polymorphic engine for VBA» by
jack twoflower [
Abstract]
6.1Kb«
About reversing» by
Z0mbie [
Abstract]
13.78Kb«
Advanced Macro Virus Techniques Issue #1» by
Alchemy [
Abstract]
12.14Kb«
All About Viruses» by
Alan Solomon [
Abstract]
41.3Kb«
Anti heuristic techniques» by
Black Jack 16.88Kb«
Anti-TBClean code» by
Ghost 3.87Kb«
Anti-Virus Toolkit Reference Guide» by
Alan Solomon [
Abstract]
37.15Kb«
The Basic of Excel Virus Writing» by
FoxZ [
Abstract]
5.25Kb«
Batch File Viruses» by
Black Wolf [
Abstract]
2.43Kb«
Batch Virii» by
Knowdeth [
Abstract]
4.31Kb«
BATch virii tutorial» by
Stramonium 32.88Kb«
C to assembly, language point of view» by
Star0 [
Abstract]
6.13Kb«
Code transformation and finite automatons» by
Z0mbie 22.32Kb«
COM Viruses» by
Black Wolf [
Abstract]
10.48Kb«
Combined Viruses» by
Black Wolf [
Abstract]
7.91Kb«
Compatible, Resident Windows 95 Viruses» by
DV8 [
Abstract]
15.18Kb«
The Computer Security Encyclopedia. Computer Viruses.» by
Fred Cohen [
Abstract]
68.07Kb«
Computer virus hits again»
2.5Kb«
The Computer Virus Problem» by
David Stang 44.72Kb«
Data encoding in meta viruses» by
Z0mbie 7.35Kb«
Dialogues with AVs» by
Changeling 20.95Kb«
A different way to make a TSR virus (or how a boot virus can hook dos interrupts)» by
Somniun [
Abstract]
21.38Kb«
The Dreaded Computer Virus and Why You Should be Concerned» by
Al Doran 10.73Kb«
EXE Viruses» by
Black Wolf [
Abstract]
9.37Kb«
Exploring RDA» by
Kharn [
Abstract]
7.73Kb«
Fighting Computer Virus Infection through Auto-Immune Responses - Applying Principles of Life to Anti-Virus Technology» by
David Stang [
Abstract]
35.82Kb«
Finding INT 21's real address using the PSP» by
Satan's Little Helper [
Abstract]
11.67Kb«
Full Thunderbyte Stealth...» [
Abstract]
13.26Kb«
Further virus strategies» by
Mouth of Sauron 27.89Kb«
A general description of the methods behind a polymorph engine» by
The Black Baron [
Abstract]
23.19Kb«
GLiTCH's Polymorphic Batch Tutorial» by
GLiTCH 13.33Kb«
A guide to Anti-Heuristics / Shmistics Technology» by
Kohntark 25.3Kb«
A Guide to Evaluating Anti-Virus Software» by
Alan Solomon [
Abstract]
57.88Kb«
Guide to Memory Resident Viruses» by
Black Wolf [
Abstract]
53.19Kb«
Guide to Resident Viruses» by
Cmdr PVC [
Abstract]
27.13Kb«
Guidelines for an Anti-Virus Policy» by
Alan Solomon [
Abstract]
21.39Kb«
How To Write A Virus For The Macintosh or 'How I Learned To Stop Worrying And Love The Resource Manager'» [
Abstract]
24.74Kb«
Inside of Avp4» by
Z0mbie [
Abstract]
2.68Kb«
Interview with Alan Solomon» by
Dark Fiber 9.04Kb«
Interview with Aurodreph/SLAM» by
FoxZ 4.6Kb«
Interview with Billy Belcebu/iKX» by
Benny 33.08Kb«
Interview with Blonde» by
The Unforgiven 17.9Kb«
Interview with Cicatric» by
Horny Toad 8.15Kb«
Interview with Cicatrix for Slam» by
Virtual Daemon 10.67Kb«
Interview with Crom-Cruach» by
Trident 8.77Kb«
Interview with Dark Fiber» by
Cicatrix 11.63Kb«
Interview with Dark Slayer» by
Metabolis 4.71Kb«
Interview with Executioner» by
Virtual Daemon 13.66Kb«
Interview with Executioner/Living Turmoil for Slam» by
Virtual Daemon 13.2Kb«
Interview with Foxz» by
Cicatrix 6.21Kb«
Interview with Griyo» by
IKX 20.37Kb«
Interview with John Tardy» by
Trident 17.05Kb«
Interview with Kpv-Team» by
FoxZ 4Kb«
Interview with Lucifer/Messiah» by
Sarah Gordon 33.85Kb«
Interview with Masud Khafir» by
Trident 11.97Kb«
Interview with Metabolis» by
Cicatrix 7.55Kb«
Interview with Methyl» by
Cicatrix 24.2Kb«
Interview with Mr. Sandman» by
Bozo 27.14Kb«
Interview with Opic» by
Cicatrix 14.93Kb«
Interview with Potti Rotti» by
The Unforgiven 22.69Kb«
Interview with RustBug for Slam» by
Virtual Daemon 8.58Kb«
Interview with StarZer0/iKX» by
Benny 23.17Kb«
Introduction to macro viruses» by
Alan Solomon [
Abstract]
21.24Kb«
It's the End of the World (as we know it)» by
Alan Solomon [
Abstract]
18.73Kb«
Java, ActiveX and the Virus Threat» by
Alan Solomon [
Abstract]
8.86Kb«
Jerk1N's Tutorial Series» by
Jerk1N 22.21Kb«
Let's talk Stealth» by
Stomach Contents [
Abstract]
15.86Kb«
Macro Virus Heuristics» by
Alan Solomon [
Abstract]
1.55Kb«
Making Windows 95 Compatible Viruses» by
Yosha [
Abstract]
6.53Kb«
Metamorphism and permutation: feel the difference» by
Z0mbie 1.13Kb«
Neophyte's Macro Virus Tutorial» by
Neophyte [
Abstract]
79.34Kb«
A new, completely transparent method of deactivating/reactivating VSAFE» [
Abstract]
2.26Kb«
Opcode Frequency Statistics» by
Z0mbie [
Abstract]
8.82Kb«
Overwriting virus tutorial #2» by
RatBoy [
Abstract]
14.75Kb«
Panic computing: The viral metaphor and computer technology» by
Deborah Lupton 39.31Kb«
Permutation conditions» by
Z0mbie [
Abstract]
10.11Kb«
Phunky Virus Writing Guide» by
Dark Angel [
Abstract]
106.07Kb«
Plumbing the Depths» by
Alan Solomon [
Abstract]
9.3Kb«
Sheep: Fact or Fiction» by
Sarah Gordon 2.89Kb«
Some ideas about metamorphism» by
Z0mbie [
Abstract]
5.41Kb«
A strange story» by
Bernd Fix [
Abstract]
19.42Kb«
Theory Of Better File Virus Distribution (a study in new ideas?)» by
VicodinES 10.79Kb«
Traitor Outlook» by
Z0mbie [
Abstract]
6.78Kb«
Tunneling Document #4 (Development of Emulation Systems)» by
Methyl [
Abstract]
152.48Kb«
Tunneling via Mini-Tunnelers» by
Methyl [
Abstract]
74.74Kb«
Upper memory residency» by
IntrusO [
Abstract]
14.39Kb«
Viral Technology Past, Present, Future» by
Methyl [
Abstract]
26.67Kb«
Virus engines: common recomendations (3rd edition)» by
Z0mbie [
Abstract]
14.38Kb«
Virus in C» by
Black Wolf [
Abstract]
10.44Kb«
Virus Software and the First Amendment» by
Mary-Frances Panettiere [
Abstract]
8.47Kb«
Win95 structures and secrets» by
Murkry [
Abstract]
9.73Kb«
Windows 95 and Viruses» by
Alan Solomon [
Abstract]
3.31Kb«
Windows NT and Viruses» by
Alan Solomon [
Abstract]
7.13Kb«
Wordmacro Viruses» by
b0z0 16.54Kb«
Worms» by
Alan Solomon [
Abstract]
1.9Kb«
Writing ELF parasitic Code in C» by
BrainStorm [
Abstract]
11.73Kb