References
- Symantec antiVirus for Macintosh-knowledge-base-About Trojan Horses, http://servicel.symantec.com/SUPPORT/num.nsf/d514450ab7fffddf852565a600636fb9/900ea4166e937d52852565a60063a176?OpenDocument
- Virus Protection, http://helpdesk.uvic.ca/how-to/support/virus.html#winfeatures
- R.W. Lo, K.N. Levitt, R.A. Olsson, 'MCF: a Malicious Code Filter,' Computers & Security, 1995, Vol.14, No.6, pp. 541-566 https://doi.org/10.1016/0167-4048(95)00012-W
- Trojan Port List, http://www.glocksoft.com/trojan_port.htm
- C. Ko, G. Fink, K. Levitt, 'Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring,' Proc. of the 10th Annual Computer Security Applications Conference, Orlando, FL, 5-9 Dec. 1994, pp. 134-144 https://doi.org/10.1109/CSAC.1994.367313
- F. Schneider, 'Enforceable Security Policies', Techbnical Report, TR98-1664, Dept of Computer Science, Cornell University, 1998
- A. Acharya, M. Raje, 'MAPbox : Using Parameterized Behavior Classes to Confine Applications', Technical report TRCS99-15, Dept of Computer Science, University of Califormia, Santa Barbara
- EROS: The Extremely Reliable Operating System, http://www.eros-os.org
- T. Mitchem and R. Lu and R. O'Brien, 'Using Kernel Hypervisors to Secure Applications', in the Proc of the Annual Computer Security Application Conference(ACSAC97), 1997 https://doi.org/10.1109/CSAC.1997.646188
- S. Oaks, 'Java Security', O'Reilly, 1998
- 'Trojan Horses', http://www.ladysharrow.ndirect.co.uk/Maximum%20Security/trojans.htm
- S. Mann, E. L. Michell, 'Linux System Securtiy : An Administrator's Guide to Open Source Security Tools', Prentice Hall RTR, 2000
- 'Navidad.exe', http://home.ahnlab.com/virus-info/navidad.html, 2000
- J. Viega, J.T. Bloch, T. Kohno, G. McGraw, 'ITS4: A Static Vulnerability Scanner for C and C++ Code', In Proc. of the 16th Annual Computer Security Applications Conference(ACSAC'00), 2000 https://doi.org/10.1109/ACSAC.2000.898880
- H. Thimbleby, S. Anderson, P. Cairns, 'A framework for modeling Trojans and computer virus infection', Computer Journal, Vol. 41, No. 7, pp444-458, 1999 https://doi.org/10.1093/comjnl/41.7.444
- I. Goldberg, D. Wagner, R. Thomas, E. A. Brewer, 'A Secure Environment for Untrusted Helper Applications confining the Wily Hacker', Technical Report, University of California Berkeley, 1996
- G.C. Necula and P. Lee, 'Safe Kernel Extensions Without Run-Time Checking', in the Proc. of the Second Symposium on Operating Systems Design and Implementation(OSDI'96), 1996 https://doi.org/10.1145/238721.238781
- R. D. Nicola, G. Ferrari, R. Pugliese, 'Types as Specifications of Access Polices', Available at http://rap.dsi.unifi.it/papers/html. To appear in Theoretical Computer Science, http://www.cs.engruky.edu/~lewis/essays/compilers/Ⅱ-lang.html
- Alfred V. Aho, Ravi Sethi, and Jeffrey D. Ullman, 'Compilers: Principles, Techniques and Tools', Addison-Wesley 1986