Peter Ladkin, Harold Thimbleby
 Computers & Security, 13(6), pp527–531, 1994.
 ISSN 0167-4048
  1994
 Download PDF (217.51Kb) (You need to be registered on forum)
Download PDF (217.51Kb) (You need to be registered on forum)We discuss a procedure proposed by Voas, Payne & Cohen [6] for detecting the existence of software corruption in real time. In particular, we discuss problems posed by the concurrent execution of programs. In the cases where the proposed method may work, corruption is unlikely to be a problem; and where corruption by viruses and Trojans are a problem, major problems with the method remain.