Abstract:
Summarizes research on viruses and defenses. The author examines the state-of-the-art in virus defense today and describes how normal computing activities can proceed wit...Show MoreMetadata
Abstract:
Summarizes research on viruses and defenses. The author examines the state-of-the-art in virus defense today and describes how normal computing activities can proceed without undue risk of substantial viral harm. He then describes a set of redundant integrity protection mechanisms used in defending against computer viruses in untrusted computing environments. They include applications of coding theory, cryptography, operating system modifications, redundancy for detection and repair, fault avoidance, synergistic effects, and defense-in-depth.<>
Published in: Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on Security Technology
Date of Conference: 01-03 October 1991
Date Added to IEEE Xplore: 06 August 2002
Print ISBN:0-7803-0120-X