Maximize
Bookmark

VX Heaven

Library Collection Sources Engines Constructors Simulators Utilities Links Forum
[Deutsch][English][Español][Italiano][Français][Polski][Русский][Українська]

Library: Index by title

[Back to category index]

"

«"DELAYED CODE" technology (version 1.1)» by Z0mbie [Abstract] 11.28Kb
«"Do polymorphism" tutorial» by Wintermute [Abstract] [SRC] 15.91Kb
«The "Father Christmas worm"» by James Green, Patricia Sisson [Abstract] 22.8Kb
«"Good" Worms and Human Rights» by John Aycock, Alana Maurushat [Abstract] 28.87Kb
«"Smart" trash: building of logic» by pr0mix [Abstract] [SRC] 15.8Kb
«A "Virus Group" or "Viral Warez?"» by Nowhere Man [Abstract] 2.76Kb
«The "Worm" Programs - Early Experience with a Distributed Computation» by John Shoch, Jon Hupp [Abstract] 40.01Kb

$

«$$$_+$$+$$__+_$+$$_$+$$$_+$$_$» by Peter Ferrie [Abstract] [SRC] 19.43Kb

'

«The 'bliem' polymorphic engine for VBA» by jack twoflower [Abstract] 6.1Kb
«'Holey' virus, Batman!» by Peter Ferrie [Abstract] 13.34Kb
«'Vircing' the InVircible» by Vesselin Bontchev [Abstract] 157.42Kb

(

«A (long) story about an (old) Apple II virus» by Joe Dellinger [Abstract] 13.22Kb

0

«010 Editor Scripts» by roy g biv [Abstract] [SRC] 7.37Kb

3

«32 bit optimization» by Billy Belcebú [Abstract] [SRC] 13.1Kb

6

«64-bit rugrats» by Peter Ferrie, Péter Ször [Abstract] [SRC] 12.65Kb

A

«About AV-Checker» by pr0mix [Abstract] 18.83Kb
«About reversing» by Z0mbie [Abstract] 13.78Kb
«An Abstract Theory of Computer Viruses» by Leonard Adleman [Abstract] [TeX] 40.82Kb
«Abusing .CTORS and .DTORS for fun 'n profit» by Izik [Abstract] [SRC] 12.4Kb
«Accessing Windows 95 API's by scanning PE-tables» by Lord Julus [Abstract] 26.63Kb
«ACG in the Hole» by Adrian Marinescu [Abstract] 10.85Kb
«Adding LDT entries in Win2K» by Z0mbie [Abstract] 7.11Kb
«The Adolescence of P-1» by Thomas Ryan [Abstract] 547.42Kb
«Advanced EPO: Deeper, longer and harder (Part 1)» by herm1t [Abstract] [TeX] [SRC] 15.09Kb
«Advanced Macro Virus Techniques Issue #1» by Alchemy [Abstract] 12.14Kb
«Advanced Metamorphic Techniques in Computer Viruses» by Philippe Beaucamps [Abstract] [TeX] [SRC] 65.42Kb
«Advanced polymorphic engine construction» by The Mental Driller [Abstract] [SRC] 38.16Kb
«Advanced Polymorphism Primer» by Dark Angel [Abstract] [SRC] 9.53Kb
«Alabama Computer Crime Act» 7.34Kb
«Alfred Bester Is Alive and Well and Living in Winterset, Iowa» by Bret Bertholf [Abstract] 49.43Kb
«Algebraic Specification of Computer Viruses and Their Environments» by Matt Webster [Abstract] 44.86Kb
«All About Viruses» by Alan Solomon [Abstract] 41.3Kb
«AMCW - A New Weapon for the New Millennium» by Sung Yang [Abstract] 17.6Kb
«Analysis and Maintenance of a Clean Virus Library» by Vesselin Bontchev [Abstract] 50.6Kb
«Analysis of the "Offensive Polymorphic Engine v2"» by Alumna [Abstract] [SRC] 6.01Kb
«Analysis of Virus Algorithms» by Jyoti Kalyani, Karanjit Singh Kahlon, Harpal Singh, Anu Kalyani [Abstract] 22.31Kb
«Anarchy in the USSR» by Igor Daniloff [Abstract] 13.47Kb
«Anatomy of Malice» by Stephen Cass [Abstract] 20.8Kb
«Ani-hilate this week» by Peter Ferrie [Abstract] [SRC] 9.74Kb
«The Animal Episode» by John Walker [Abstract] 18.06Kb
«Another Computing Platform Gets Its First Virus» by Brian McWilliams [Abstract] 2.91Kb
«Anti AV Techniques For Batch» by cOrRuPt G3n3t!x [Abstract] 7.77Kb
«Anti heuristic techniques» by Black Jack 16.88Kb
«Anti Virus Detection Strategies and how to overcome them» by Tiberio Degano [Abstract] [SRC] 20.76Kb
«ANTI-Anti-Virus Tricks Version 1.00» by MnemoniX [Abstract] 17.93Kb
«Anti-Debugger & Anti-Emulator Lair» by Lord Julus [Abstract] 63.54Kb
«Anti-TBClean code» by Ghost 3.87Kb
«The Anti-Virus Cook Book v1.5» by Kurt Wismer [Abstract] 41.28Kb
«The Anti-Virus Strategy System» by Sarah Gordon [Abstract] 33.44Kb
«Anti-Virus Toolkit Reference Guide» by Alan Solomon [Abstract] 37.15Kb
«Antivirus Software Testing for the New Millenium» by Sarah Gordon, Howard Fraser [Abstract] 42.32Kb
«The Application of Epidemiology to Computer Viruses» by William Murray [Abstract] 29.7Kb
«Applied Cryptanalysis of Cryptosystems and Computer Attacks Through Hidden Ciphertexts Computer Viruses» by Eric Filiol [Abstract] [TeX] 34.27Kb
«An Approach to Containing Computer Viruses» by Terence Gray, Maria Pozzo [Abstract] 38.66Kb
«Approaching Zero: The Extraordinary Underworld of Hackers, Phreakers, Virus Writers, And Keyboard Criminals» by Paul Mungo, Bryan Glough [Abstract] 467.74Kb
«Are 'Good' Computer Viruses Still a Bad Idea?» by Vesselin Bontchev [Abstract] 68.83Kb
«Are Anti-Virus Companies Criminals?» by SnakeByte [Abstract] 4.1Kb
«Are Computer Hacker Break-ins Ethical?» by Eugene Spafford [Abstract] 38.19Kb
«Are Evolutionary Rule Learning Algorithms Appropriate for Malware Detection?» by Zubair Shafiq, Momina Tabish, Muddassar Farooq [Abstract] [TeX] 11.91Kb
«Are Good Virus Simulators Still a Bad Idea?» by Sarah Gordon [Abstract] 28.59Kb
«Are the Current Computer Crime Laws Sufficient or Should the Writing of Virus Code Be Prohibited?» by Robert Kroczynski [Abstract] 150.82Kb
«Argument For A 'Good' Virus» by MidNyte [Abstract] 28.82Kb
«Argument for slow infection and slow polymorphism» by Rogue Warrior [Abstract] 7.54Kb
«Aristotle: "It's a giant pissing contest!" he sez of Vx/A-V» by George Smith [Abstract] 2.55Kb
«Ars loricatus novus or A small introduction to retro-armoring» by Nomenumbra [Abstract] [SRC] 16.65Kb
«The Art of Computer Virus Research and Defense» by Péter Ször [Abstract] [TeX] [SRC] 1.41Mb
«The Art of Virii Collecting» by Tally [Abstract] 41.56Kb
«Artificial intelligence and viruses» by J. S. Bach [Abstract] 18.27Kb
«As above, sobelow» by Peter Ferrie [Abstract] [SRC] 12.23Kb
«The Asexual Virus: Computer Viruses in Feminist Discourse» by Martina Gillen [Abstract] 59.87Kb
«Asmodeus takes a look into the crystal ball» by Asmodeus [Abstract] 2.34Kb
«ASP.NET Virus Writing Guide» by SPTH [Abstract] [SRC] 24.53Kb
«Assembly language or HLL?» by Navrhar [Abstract] 6.93Kb
«Atari 8-bit virus» by Pirx [Abstract] [SRC] 8.8Kb
«Attack of the Clones» by Peter Ferrie [Abstract] 9.91Kb
«Automated reverse engineering: Mistfall engine» by Z0mbie [Abstract] [SRC] 15.43Kb
«Automatic Extraction of Computer Virus Signatures» by Jeffrey Kephart, William Arnold [Abstract] [TeX] 53.1Kb
«Automatically generated Win32 heuristic virus detection» by William Arnold, Gerald Tesauro [Abstract] 31.08Kb
«Autonomous Mobile Cyber Weapon» by Sung Yang [Abstract] 33.37Kb
«AVP 2.2 naked» by Mister Sandman [Abstract] 7.22Kb

B

«Back to the Future: What viruswriters in the past thought about the viruses of the future» by SPTH [Abstract] 30.47Kb
«Bad Transfer» by Peter Ferrie, Péter Ször [Abstract] 12.15Kb
«The Basic of Excel Virus Writing» by FoxZ [Abstract] 5.25Kb
«Batch File Viruses» by Black Wolf [Abstract] 2.43Kb
«Batch IRC/Outlook Spreading» by cOrRuPt G3n3t!x [Abstract] 12.21Kb
«Batch Virii» by Knowdeth [Abstract] 4.31Kb
«BATch virii tutorial» by Stramonium 32.88Kb
«Batch Viruses (second issue)» by Wavefunc [Abstract] 13.13Kb
«Becoming Positive» by Sadie Plant 12.41Kb
«Biological Aspects of Computer Virology» by Vasileios Vlachos, Diomidis Spinellis, Stefanos Androutsellis-Theotokis [Abstract] [TeX] 33.39Kb
«Biologically Inspired Defenses Against Computer Viruses» by Jeffrey Kephart, Gregory Sorkin, William Arnold, David Chess, Gerald Tesauro, Steve White [Abstract] [TeX] 66.15Kb
«The biology of digital organisms» by Claus Wilke, Christoph Adami [Abstract] 37.34Kb
«Blast off!» by Peter Ferrie, Frédéric Perriot, Péter Ször [Abstract] 8.87Kb
«Blindingly» by MidNyte [Abstract] 8.33Kb
«Blueprint for a Computer Immune System» by Jeffrey Kephart, Gregory Sorkin, Morton Swimmer, Steve White [Abstract] 54.32Kb
«BOMbing The System» by roy g biv [Abstract] [SRC] 7.12Kb
«Book worm» by Paul Baccas [Abstract] 7.51Kb
«Boot Infectors» by Dark Angel [Abstract] 11.85Kb
«A brand new way to fool TBScan» by Automag [Abstract] 1.67Kb
«A Brief History of PC Viruses» by Alan Solomon [Abstract] 41.11Kb
«A brief history of virii vs. antivirii war» by flush [Abstract] 48.55Kb
«A brief viral Introduction into F#» by SPTH [Abstract] [SRC] 11.17Kb
«BTX encryption» by hh86 [Abstract] [SRC] 4.02Kb
«The Bulgarian and Soviet Virus Factories» by Vesselin Bontchev [Abstract] 56.56Kb
«Business and Commercial Offenses» [Abstract] 3.91Kb
«A Bypass of Cohen's Impossibility Result» by Jan Bergstra, Alban Ponse [Abstract] [TeX] 38.2Kb

C

«C to assembly, language point of view» by Star0 [Abstract] 6.13Kb
«Cabirn fever» by Peter Ferrie, Péter Ször [Abstract] 6.44Kb
«Cain and Abul» by Peter Ferrie [Abstract] 9.93Kb
«Can Computer Viruses Be Domesticated to Serve Mankind?» by John Markoff [Abstract] 6.98Kb
«Can cryptography prevent computer viruses?» by John Morar, David Chess [Abstract] [TeX] 36.79Kb
«Can hackers be sued for damages caused by computer viruses?» by Pamela Samuelson [Abstract] 16.71Kb
«Can Viruses Ever Be Useful?» by Harold Thimbleby [Abstract] 13.87Kb
«Can you spare a seg?» by Peter Ferrie [Abstract] 9.83Kb
«Capture the desktop - scan .LNK files for victims» by DiA [Abstract] [SRC] 24.6Kb
«CARO's Undisclosed Illegal Meeting Agenda» by Rock Steady [Abstract] 9.04Kb
«CARO's Undisclosed Meeting Agenda» by ARiSToTLE [Abstract] 9.12Kb
«A Case for Benevolent Viruses» by Fred Cohen [Abstract] 35.47Kb
«Catch Me If You Can» by Gregory Benford [Abstract] 7.95Kb
«Caveat virus» by herm1t [Abstract] [SRC] 7.88Kb
«Challenges in getting 'formal' with viruses» by Arun Lakhotia, Prabhat Singh [Abstract] 24.03Kb
«Chamber of horrors» by Peter Ferrie [Abstract] 9.75Kb
«Chiba witty blues» by Peter Ferrie, Frédéric Perriot, Péter Ször [Abstract] 10.26Kb
«Chilling Fridrik» by Blade Runner [Abstract] 2.65Kb
«Chomsky Hierarchy and the Word Problem in Code Mutation» by SPTH [Abstract] [SRC] 18.67Kb
«Classification of Computer Viruses Using the Theory of Affordances» by Matt Webster, Grant Malcolm [Abstract] [TeX] [SRC] 71.11Kb
«Code Evolution: Follow nature's example» by SPTH [Abstract] [SRC] 17.58Kb
«Code Optimisation, A Beginner's Guide» by Dark Angel [Abstract] 6.19Kb
«Code transformation and finite automatons» by Z0mbie 22.32Kb
«Code via Behaviour» by SPTH [Abstract] [SRC] 9.97Kb
«COM Viruses» by Black Wolf [Abstract] 10.48Kb
«Combinatorial Optimisation of Worm Propagation on an Unknown Network» by Eric Filiol, Edouard Franc, Alessandro Gubbioli, Benoit Moquet, Guillaume Roblot [TeX] [SRC] 35.83Kb
«Combined Viruses» by Black Wolf [Abstract] 7.91Kb
«Combining a mailworm with GPG» by R3s1stanc3 [Abstract] 4.07Kb
«Comment on 'A Framework for Modelling Trojans and Computer Virus Infection'» by Erkki Makinen [Abstract] 11.84Kb
«A comment on Cohen's theorem about undecidability of viral detection» by Franz Steinparz [Abstract] 4.58Kb
«Comments on a paper by Voas, Payne & Cohen: “A model for detecting the existence of software corruption in real time”» by Peter Ladkin, Harold Thimbleby [Abstract] [TeX] 14.49Kb
«Communicating Viruses» by Changeling [Abstract] 5.39Kb
«Compatible, Resident Windows 95 Viruses» by DV8 [Abstract] 15.18Kb
«Compiled HTML» by roy g biv [Abstract] [SRC] 4.64Kb
«The Complete Re-write Engine» by MidNyte [Abstract] 13.48Kb
«Computational Aspects of Computer Viruses» by Fred Cohen [Abstract]
«Computational Brittleness and Evolution in Machine Language» by Paul-Michael Agapow [Abstract] 26.07Kb
«COMPUTE!'s computer viruses» by Ralph Roberts [Abstract] 333.94Kb
«Computer (In)security: Infiltrating Open Systems» by Ian Witten [Abstract] [SRC] 83.07Kb
«Computer Immunology» by Stephanie Forrest, Steven Hofmeyr, Anil Somayaji [Abstract] 33.66Kb
«Computer Parasitology» by Carey Nachenberg [Abstract] 96.5Kb
«Computer pranksters plant 'virus' in Macs» by John Markoff [Abstract] 4.79Kb
«Computer Programs, Weapons of War in a Digital World» by The Ollin [Abstract] 16.86Kb
«The Computer Security Encyclopedia. Computer Viruses.» by Fred Cohen [Abstract] 68.09Kb
«Computer Systems Under Siege» by Vin McLellan [Abstract] 13.18Kb
«Computer Virus» by Nancy Kress [Abstract] 100.79Kb
«The computer virus as a tool of individual empowerment» by The Flim-Flam Man [Abstract] 4.18Kb
«The Computer Virus Culture» by Jamie Mitchell [Abstract] 7.06Kb
«Computer virus hits again» 2.5Kb
«Computer virus prevention and containment on mainframes» by Ghannam Al-Dossary [Abstract] 39.67Kb
«The Computer Virus Problem» by David Stang 44.72Kb
«Computer Virus-Antivirus Coevolution» by Carey Nachenberg [Abstract] 29.05Kb
«Computer Viruses» by Peter Denning 17.75Kb
«Computer viruses (BMJ 296-013)» by John Asbury [Abstract] 4.55Kb
«Computer viruses (BMJ 299-66a)» by John Croall, Ian McKay [Abstract] [TeX] 2.41Kb
«Computer viruses (BMJ 302-66e)» by John Croall [Abstract] 2.23Kb
«Computer viruses (BMJ 307-59e)» by Patrick Harkin [Abstract] [TeX] 2.75Kb
«Computer viruses - a high-tech disease» by Ralf Burger [Abstract] [TeX] [SRC] 466.43Kb
«Computer Viruses - Legal Options» by Bernard Zajac [Abstract] 6.73Kb
«Computer Viruses - Theory and Experiments» by Fred Cohen [Abstract] 62.59Kb
«Computer viruses and anti-virus warfare» by Jan Hruska [Abstract] [TeX] [SRC] 521.67Kb
«Computer Viruses and Ethics» by Eugene Spafford [Abstract] 45.75Kb
«Computer Viruses and Malware» by John Aycock [Abstract] [TeX] [SRC] 499.38Kb
«Computer Viruses and Related Threats: A Management Guide» by John Wack, Lisa Carnahan [Abstract] 92.39Kb
«Computer Viruses and the Human Mind» by Robin Robertson [Abstract] 39.46Kb
«Computer Viruses as Artificial Life» by Eugene Spafford [Abstract] 55.31Kb
«Computer Viruses In Unix Networks» by Peter Radatti [Abstract] 36.84Kb
«Computer Viruses, Artificial Life and Evolution» by Mark Ludwig [TeX] [SRC] 573.34Kb
«Computer Viruses: A Global Perspective» by Steve White, Jeffrey Kephart, David Chess [Abstract] 50.91Kb
«Computer Viruses: Myth or Reality?» by Howard Israel [Abstract] [TeX] 20.83Kb
«Computer viruses: Prevention, Detection, and Treatment» by Mario Tinto [Abstract] 40.27Kb
«Computer Viruses: the Inevitability of Evolution?» by Paul-Michael Agapow [Abstract] [TeX] 29.11Kb
«Computer Viruses: The Technology and Evolution of an Artificial Life Form» by Karsten Johansson [SRC] 316.07Kb
«Computer Viruses: Why writing and making available a computer virus is not a crime» by Ellipsis [Abstract] 5.37Kb
«Computer-Generated Life» by Eric Olson [Abstract] 31.12Kb
«Computers and epidemiology» by Jeffrey Kephart, David Chess, Steve White [Abstract] 34.1Kb
«Computers Under Attack: Intruders, Worms and Viruses» by Peter Denning
«Computers under attacks!» by Anne Bonfante, Jean-Yves Marion [Abstract] 13.87Kb
«Computerviruses meet Infopath» by SPTH [Abstract] [SRC] 15.95Kb
«Concepts of cooperation in artificial life» by Harold Thimbleby, Ian Witten, David Pullinger [Abstract] [TeX] 41.9Kb
«Conflict and the Computer: Information Warfare and Related Ethical Issues» by Sam Nitzberg [Abstract] 30.08Kb
«Consensual Realities In Cyberspace» by Paul Saffo [Abstract] 10.37Kb
«Construction Kit on infecting .COM» by Rock Steady [Abstract] [SRC] 7.04Kb
«Contagion on the Internet» by Trudy Wassenaar, Martin Blase 10.34Kb
«Contruction Kit for TSR Virii» by Rock Steady [Abstract] 8.46Kb
«Convergence of Virus Writers and Hackers: Fact or Fantasy?» by Sarah Gordon, Qingxiong Ma [Abstract] 41.49Kb
«Coping with Computer Viruses and Related Problems» by Steve White, David Chess, Chengi Kuo [Abstract] 63.76Kb
«A Core War bestiary of viruses, worms and other threats to computer memories» by Alexander Dewdney 22.44Kb
«A Cost Analysis of Typical Computer Viruses and Defenses» by Fred Cohen [Abstract] [TeX] 41.79Kb
«Countering Kernel Rootkits with Lightweight Hook Protection» by Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning [Abstract] [SRC] 71.47Kb
«Covert Distributed Processing with Computer Viruses» by Steve White [Abstract] [TeX] 9.03Kb
«Crawling - A unique spreading technique» by freeon [Abstract] [SRC] 15.29Kb
«Crazy ToDo list for VXers» by Belial, SPTH [Abstract] [SRC] 12.9Kb
«Crimea river» by Peter Ferrie [Abstract] 12.26Kb
«A Critical Look at the Regulation of Computer Viruses» by Mathias Klang [Abstract] 62.36Kb
«Cross Infection in JavaScript» by SPTH [Abstract] 16.76Kb
«Cross-scripting attacks» by roy g biv [Abstract] [SRC] 3.25Kb
«Cruncher - The First Beneficial Virus?» by Eugene Kaspersky [Abstract] 9.54Kb
«A Cryptographic Checksum for Integrity Protection» by Fred Cohen [Abstract] 22.24Kb
«Cryptography and Viruses» by Simone McCloskey [Abstract] 28.89Kb
«Cryptovirology: Extortion-Based Security Threats and Countermeasures» by Adam Young, Moti Young [Abstract] 64.55Kb
«The Cuckoo's Egg» by Cliff Stoll [Abstract] 722.46Kb
«Curious Yellow: The First Coordinated Worm Design» by Brandon Wiley [Abstract] 22.03Kb

D

«Dark Side of the Moon: What Motivates Virus Writers» by Markus Salo [Abstract] 9.32Kb
«DarkMarket: cyberthieves, cybercops and you» by Misha Glenny [Abstract] 521.51Kb
«Darwin» by Aleph Null [Abstract] [TeX] 9.79Kb
«Darwin inside the machines: Malware evolution and the consequences for computer security» by Dimitris Iliopoulos, Christoph Adami, Péter Ször [Abstract] [TeX] 41.7Kb
«Darwin, a Game of Survival of the Fittest among Programs» by Douglas McIlroy [Abstract] 11.22Kb
«Data encoding in meta viruses» by Z0mbie 7.35Kb
«A Day in the Life of an Anti-Virus Lab» by Robert Vibert [Abstract] 14.73Kb
«Dealing with Metamorphism» by Myles Jordan [Abstract] 11.72Kb
«Debug Assisted Decoding» by hh86 [Abstract] [SRC] 6.64Kb
«Deelaed learning» by Peter Ferrie [Abstract] 15.94Kb
«Defense and Detection Strategies against Internet Worms» by Jose Nazario [Abstract] 630.04Kb
«Defense-In-Depth Against Computer Viruses» by Fred Cohen [Abstract] [TeX] 69.27Kb
«Delta Offset» by Tokugawa Ieyasu [Abstract] [SRC] 5.37Kb
«Description of the win98/INT 2E services (VMM/NTKERN.VxD)» by Z0mbie 44.22Kb
«The Design Space of Metamorphic Malware» by Andrew Walenstein, Rachit Mathur, Mohamed Chouchane, Arun Lakhotia [Abstract] [TeX] 38.28Kb
«Details Emerge on the First Windows Mobile Virus» by Cyrus Peikari, Seth Fogie, Ratter [Abstract] 43.5Kb
«Detecting Complex Viruses» by Peter Ferrie, Frédéric Perriot [Abstract] 11.5Kb
«Detecting Unknown Computer Viruses - A New Approach» by Mori Akira, Sawada Toshimi, Izumida Tomonori, Inoue Tadashi [Abstract] 42.59Kb
«Detection of New Malicious Code Using N-grams Signatures» by Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray Sweidan [Abstract] [TeX] 31.53Kb
«Developing virus identification products» by Tim Sankary [Abstract] 20.26Kb
«Dialogues with AVs» by Changeling 20.95Kb
«A different way to make a TSR virus (or how a boot virus can hook dos interrupts)» by Somniun [Abstract] 21.38Kb
«Digital Monsters, Binary Aliens - Computer Viruses, Capitalism and the Flow of Information» by Jussi Parikka [Abstract] 66.5Kb
«Dir Stealth Method 2» by Rock Steady [Abstract] 4.48Kb
«Directed-Graph Epidemiological Models of Computer Viruses» by Jeffrey Kephart, Steve White [Abstract] [TeX] 97.07Kb
«Directory Stealth» by Rock Steady [Abstract] 7.86Kb
«Disassemblers within viruses» by Z0mbie [Abstract] 14.61Kb
«A Discussion of Polymorphism» by Gary Watson [Abstract] 9.38Kb
«Diseas'd Ventures: A Critique of Media Reportage of Viruses» by George Smith [Abstract] 15.07Kb
«Disinfecting an Infected File» by Rock Steady [Abstract] [SRC] 11.05Kb
«The DLIT EPO techinque» by hh86 [Abstract] 2.52Kb
«DLL Hijacking in antiviruses» by pr0mix [Abstract] 13.19Kb
«Do the macarena» by Peter Ferrie [Abstract] 10.31Kb
«Do-It-Yourself Guide to Cell Phone Malware» by William Mahoney, Craig Pokorny [Abstract] 18.06Kb
«Document Macro Viruses, Yes, you can spread a virus with a data file...» by Joel McNamara [Abstract] 22Kb
«Does Your Computer Have a Virus?» by Nikki Finke [Abstract] 14.53Kb
«Doin' the eagle rock» by Peter Ferrie [Abstract] 14.07Kb
«Dr Aycock's Bad Idea: Is the Good Use of Computer Viruses Still a Bad Idea?» by Tony Sampson [Abstract] 13.32Kb
«The Dreaded Computer Virus and Why You Should be Concerned» by Al Doran 10.73Kb
«Dynamic Analysis .. What is it and how to defeat it?!» by M0SA [Abstract] 9.23Kb
«Dynamic Anti-Emulation using Blackbox Analysis» by SPTH [Abstract] [SRC] 14.42Kb
«Dynamic detection and classification of computer viruses using general behaviour patterns» by Baudouin Le Charlier, Morton Swimmer, Abdelaziz Mounji [Abstract] 43.76Kb

E

«E-mail Virus Protection Handbook» by James Stanger [Abstract]
«Easy To Infect Hard to Detect» by Tiberio Degano [Abstract] [SRC] 24.82Kb
«Echoes of Conspiracy» by FireCracker [Abstract] 8.6Kb
«Edinburgh University PC Virus Review 1992» 28.12Kb
«Effective and Inexpensive Methods Exist for Controlling Software Viruses» by Steve Gibson [Abstract] 4.97Kb
«Effusion - a new sophisticated injector for Nginx web servers» by Andrew Kovalev, Konstantin Otrashkevich, Evgeny Sidorov, Andrew Rassokhin [Abstract] 27.3Kb
«ELF executable reconstruction from a core image» by Silvio Cesare [Abstract] [SRC] 6.08Kb
«The ELF Virus Writing HOWTO» by Alexander Bartolich [Abstract]
«Email networks and the spread of computer viruses» by Stephanie Forrest, Justin Balthrop, M. Newman [Abstract] [TeX] 23.73Kb
«Emulation: Transposition of Control (From Anti-Virus to Virus)» by mos6581 [Abstract] [SRC] 9Kb
«Encryption in Perl Viruses» by SnakeByte [Abstract] [SRC] 2.91Kb
«Entering Ring-0 Using Win32 Api: Context Modification» by Z0mbie [Abstract] 5.77Kb
«An Epidemiological View of Worms and Viruses» by Thomas Chen [Abstract] 17.97Kb
«Epidemiology and computer viruses» by Alan Solomon [Abstract] 9.46Kb
«An Epidemiology of Viruses & Network Worms» by Cliff Stoll [Abstract] 20.02Kb
«EPO - entrypoint obscuring» by mort [Abstract] [SRC] 10.32Kb
«EPO in C LUA DLLs» by hh86 [Abstract] 1.75Kb
«EPO techniques under Win32» by Benny [Abstract] 6.4Kb
«EPO: Entry-Point Obscuring» by GriYo [Abstract] 16.43Kb
«EPOC Virus Tutorial» by Retro [Abstract] 5.67Kb
«EPOlution: The Evolution of Entry Point Obscuring» by roy g biv [Abstract] [SRC] 5.49Kb
«Establishing ethics in the computer virus arena» by Paul Ferguson [Abstract] 12.21Kb
«Ethical Issues in Computer Virus Distribution» by Fred Cohen [Abstract] 5.17Kb
«The Evolution of 32-Bit Windows Viruses» by Péter Ször, Eugene Kaspersky 17.16Kb
«The Evolution of the Computer Virus» by Shaun DeRosa [Abstract] 4.66Kb
«The Evolution of Viruses and Worms» by Thomas Chen, Jean-Marc Robert [Abstract] 40.75Kb
«Evolutionary Virus Propogation Technique» by saec [Abstract] 9.86Kb
«Examples of Malicious Computer Programs» by Ronald Standler [Abstract] 95.47Kb
«EXE Infections» by Rock Steady [Abstract] 15.48Kb
«EXE Self-Disinfection» by Dark Angel [Abstract] 17.26Kb
«EXE Viruses» by Black Wolf [Abstract] 9.37Kb
«Execution redirection thru ‘Image File Execution Options’ key» by GriYo [Abstract] [SRC] 8.62Kb
«The Executive Computer: A Virus Carries Fatal Complications» by Peter Lewis [Abstract] 6.41Kb
«Exotic Morphing Techniques In JavaScript» by SPTH [Abstract] 25.26Kb
«Explaining the Usages of Pipes in Virus coding» by berniee [Abstract] [SRC] 6.89Kb
«EXPLORER in-memory infection» by GriYo [Abstract] [SRC] 25.46Kb
«Exploring RDA» by Kharn [Abstract] [SRC] 7.73Kb

F

«A Failure to Learn from the Past» by Eugene Spafford [Abstract] 79.43Kb
«FAT32 New Problems for Anti-Virus, or Viruses? (version 1.01)» by Martin Overton [Abstract] 69.77Kb
«A fault tolerance approach to computer viruses» by Mark Joseph, Algirdas Avižienis [Abstract] [TeX] 30.36Kb
«FBSL Virus Writing Guide» by Genetix [Abstract] [SRC] 14.55Kb
«The federal government, independent virus researchers and the First Amendment» by James Lipshultz [Abstract] 12.72Kb
«Ferite virus writing guide» by WarGame [SRC] 8.55Kb
«A few ideas for viruses» by Kalkin/EViL [Abstract] 9.61Kb
«Fighting Computer Virus Infection through Auto-Immune Responses - Applying Principles of Life to Anti-Virus Technology» by David Stang [Abstract] 35.82Kb
«Fighting Computer Viruses» by Jeffrey Kephart, Gregory Sorkin, David Chess, Steve White [Abstract] 25.18Kb
«Fighting EPO Viruses» by Piotr Bania [Abstract] [SRC] 25.37Kb
«Fighting Talk» by Igor Daniloff [Abstract] 15.79Kb
«File infecting viri» by Robert Slade 2.41Kb
«Find Victims with FindExecutable API» by DiA [Abstract] [SRC] 6.27Kb
«Finding DC++ ShareFolders Via Xml in C#» by Retro [Abstract] [SRC] 2.14Kb
«Finding INT 21's real address using the PSP» by Satan's Little Helper [Abstract] 11.67Kb
«The flag of virtual space: Nonstandard Code Recreation» by hh86, SPTH [Abstract] [SRC] 8.79Kb
«Flexible Infections: Computer Viruses, Human Bodies, Nation-States, Evolutionary Capitalism» by Stefan Helmreich [Abstract] 59.38Kb
«Flibi night» by Peter Ferrie [Abstract] 11.08Kb
«A Formal Definition of Computer Worms and Some Related Results» by Fred Cohen [Abstract] [TeX] 41.84Kb
«Formulas for Random Number Generators» by The Mental Driller [Abstract] [SRC] 13.24Kb
«A framework for modelling trojans and computer virus infection» by Harold Thimbleby, Stuart Anderson, Paul Cairns [Abstract] 93.57Kb
«Frankie say relax» by Peter Ferrie [Abstract] 13.26Kb
«From position-independent to self-relocatable viral code» by herm1t [Abstract] [SRC] 26.33Kb
«Full Thunderbyte Stealth...» [Abstract] 13.26Kb
«Function Me» by hh86 [Abstract] [SRC] 3.2Kb
«Further virus strategies» by Mouth of Sauron 27.89Kb
«The Future Impact of Viruses» by David Emm [Abstract] 7.83Kb
«The Future of Computer Viruses» by Jan Hruska [Abstract] 23.07Kb
«The Future of Malware» by Stephen Trilling, Carey Nachenberg [Abstract] 67.82Kb
«The future of virus detection» by Richard Ford [Abstract] 28.74Kb
«The Future of Viruses on the Internet» by David Chess [Abstract] 18.42Kb
«Future Trends in Virus Writing» by Vesselin Bontchev [Abstract] 65.58Kb
«Future Viruses and Operating System Development» by nucleii [Abstract] 33.06Kb
«Future visions about virus writing» by izee [Abstract] 2.16Kb
«Future waits for your viruses» by flush [Abstract] 6.92Kb

G

«Gaining important datas from PEB under NT boxes» by Ratter [Abstract] [SRC] 6Kb
«Gatt got your tongue?» by Peter Ferrie [Abstract] 9.73Kb
«A general description of the methods behind a polymorph engine» by The Black Baron [Abstract] 23.19Kb
«Generally about VX scene (from the psychedelic point of view)» by Benny [Abstract] 4.83Kb
«A Generic Virus Scanner in C++» by Eugene Spafford, Sandeep Kumar [Abstract] 44.93Kb
«The Generic Virus Writer» by Sarah Gordon [Abstract] 49.7Kb
«Genetic algorithm based Internet worm propagation strategy modeling under pressure of countermeasures» by N. Goranin, A. Cenys [Abstract] [TeX] 30.9Kb
«Genetic programming in virus» by ValleZ [Abstract] 15.67Kb
«The Giant Black Book of Computer Viruses» by Mark Ludwig 748.76Kb
«GLiTCH's Polymorphic Batch Tutorial» by GLiTCH 13.33Kb
«Got [Mac]root?» by Peter Ferrie [Abstract] 7.67Kb
«GPGPU using OpenGL» by roy g biv [Abstract] 4.01Kb
«GPU powered file infector» by hh86 [Abstract] [SRC] 6.29Kb
«The grand debate about beneficial viruses and artificial life» by Suzana Stojakovic-Celustka [Abstract] 6.48Kb
«A guide to Anti-Heuristics / Shmistics Technology» by Kohntark 25.3Kb
«A Guide to Evaluating Anti-Virus Software» by Alan Solomon [Abstract] 57.88Kb
«Guide to improving Polymorphic Engines» by Rogue Warrior [Abstract] 17.61Kb
«Guide to Memory Resident Viruses» by Black Wolf [Abstract] 53.19Kb
«A guide to multipartite infectors 1.5» by Lord Julus [Abstract] 40.82Kb
«Guide to Resident Viruses» by Cmdr PVC [Abstract] 27.13Kb
«Guidelines for an Anti-Virus Policy» by Alan Solomon [Abstract] 21.39Kb

H

«Hacking Away at the Counterculture» by Andrew Ross 73.84Kb
«The Halftime Ass-chewing» by Horny Toad [Abstract] 3.65Kb
«Hard Disk Woes» by Jorge Lodos, Jesús Villabrille, Edgar Guadis [Abstract] [SRC] 13.83Kb
«Harder to detect (theory)» by Billy Belcebú [Abstract] 11.02Kb
«Hashes for Encryption» by SPTH [Abstract] [SRC] 9.62Kb
«Hashin' the elves» by herm1t [Abstract] [SRC] 22.24Kb
«Heads or tails?» by Peter Ferrie [Abstract] 7.34Kb
«Heaven's Gate: 64-bit code in 32-bit file» by roy g biv [Abstract] [SRC] 4.79Kb
«Heuristic Technology» by Billy Belcebú [Abstract] 6.52Kb
«Hidan and dangerous» by Peter Ferrie [Abstract] 9.54Kb
«Hidden in .NET» by hh86 [Abstract] [SRC] 4.71Kb
«The Hidden Strengths of the Dos Batch Language» by Unbekannt [Abstract] 72.85Kb
«Hiding your virus in the matrix» by SPTH [Abstract] [TeX] [SRC] 19.92Kb
«The Hiew Plugin framework» by roy g biv [Abstract] 3.74Kb
«History of Computer Viruses» by Robert Slade [Abstract] 42.19Kb
«A History Of Computer Viruses - Introduction» by Harold Highland [Abstract] 13.02Kb
«HMA Residency» by "Q" the Misanthrope [Abstract] 15.71Kb
«Hoaxes & Hypes» by Sarah Gordon, Joe Wells [Abstract] 38.71Kb
«Hooking Windows API: Technics of hooking API functions on Windows» by Holy_Father [Abstract] [SRC] 47.55Kb
«Hooking WinNT/2K/XP API v0.01» by Z0mbie [Abstract] 2.64Kb
«How AVs Detect Viruses» [Abstract] 15.68Kb
«How dumaru?» by Peter Ferrie [Abstract] 27.21Kb
«How the virus "Remote Shell Trojan" (RST) works» by Marco Balduzzi [Abstract] 6.42Kb
«How to become the world's richest man» by MidNyte [Abstract] 1.46Kb
«How to break the rules with the class libraries» by roy g biv [Abstract] 16.72Kb
«How to encrypt JavaScript viriis?» by SPTH [Abstract] [SRC] 4.87Kb
«How to have fun with ptrace syscall» by Cyberdude [Abstract] [SRC] 18.38Kb
«How to link a library to a VBProject» by jack twoflower [Abstract] 2.31Kb
«How to make infected system to depend on the virus» by Prizzy [Abstract] [SRC] 32.36Kb
«How To Write A Virus For The Macintosh or 'How I Learned To Stop Worrying And Love The Resource Manager'» [Abstract] 24.74Kb
«How Viruses Spread among Computers and People» by Alun Lloyd, Robert May [Abstract] [TeX] 10.71Kb
«Hunting for metamorphic» by Peter Ferrie, Péter Ször [Abstract] [SRC] 54.54Kb
«Hunting for Metamorphic Engines» by Wing Wong, Mark Stamp [Abstract] [TeX] 67.55Kb
«A Hygiene Lesson» by Bryan Kocher 5.36Kb
«Hypervirus: A Clinical Report» by Thierry Bardini [Abstract] 44.81Kb

I

«I Err.Raise, you fall» by hh86 [Abstract] [SRC] 6.31Kb
«I will survive...» by Changeling [Abstract] 7.1Kb
«I.Danilov vs V.Bogdanov (Dr.Web vs AVP): Programmer's Competition» by Z0mbie [Abstract] 18.52Kb
«I.T. IN PRACTICE: Computer viruses» by Adam Reynolds [Abstract] 5.67Kb
«ICQ visions» by Benny [Abstract] [SRC] 5.54Kb
«The IDA Plugin framework» by roy g biv [Abstract] [SRC] 5.09Kb
«Ideas For Your Next Virus» by alcopaul [Abstract] 4.6Kb
«If Svar is the answer...» by Peter Ferrie [Abstract] 8.54Kb
«Imitation of Life: Advanced system for native Artificial Evolution» by SPTH [Abstract] [TeX] [SRC] 42.06Kb
«The Impact of Computer Viruses on Society» by Jimming Lin, Chia-Hao Chang [Abstract] 8.4Kb
«Impersonation, your friend» by Ratter [Abstract] [SRC] 5.89Kb
«Implementing and testing a virus throttle» by Jamie Twycross, Matthew Williamson [Abstract] 40.54Kb
«Implementing genetic algorithms in virusses» by BlueOwl [Abstract] [SRC] 12.7Kb
«Imported code» by roy g biv [Abstract] [SRC] 7.88Kb
«Imposing Order on Program Statements to Assist Anti-Virus Scanners» by Arun Lakhotia, Moinuddin Mohammed [Abstract] 42.22Kb
«In the game called Core War hostile programs engage in a battle of bits» by Alexander Dewdney 22.76Kb
«In the trap of the language» by Suzana Stojakovic-Celustka [Abstract] 18.3Kb
«Infect Using CFF Explorer Scripting» by hh86 [Abstract] [SRC] 8.61Kb
«Infecting Compilers» by Silent Supporter [Abstract] 2.21Kb
«Infecting ELF-files using function padding for Linux» by herm1t [Abstract] [SRC] 25.5Kb
«Infecting ISO CD images» by Z0mbie [Abstract] 10.24Kb
«Infecting JAR-Files using the JavaCompiler Class» by R3s1stanc3 [Abstract] [SRC] 5.45Kb
«Infecting loadable kernel modules» by truff [Abstract] [SRC] 38.86Kb
«Infecting Mach-O Files» by roy g biv [Abstract] 8.02Kb
«Infecting Mathematica Notebook files» by SPTH [Abstract] [SRC] 15.46Kb
«Infecting PE files By Adding new resource» by berniee [Abstract] [SRC] 8.26Kb
«Infecting PE files with Java Bytecode» by hh86 [Abstract] [SRC] 6.11Kb
«Infecting People - A Moral Issue?» by Liquid Jesus [Abstract] 12.16Kb
«Infecting Winlogon» by Ratter [Abstract] [SRC] 4.98Kb
«Infection of biological DNA with digital Computer Code» by SPTH [Abstract] [SRC] 16.68Kb
«Infection on Closing» by Rock Steady [Abstract] [SRC] 17.48Kb
«Infection variations» by Robert Slade 2.71Kb
«Injected Evil (executable files infection)» by Z0mbie [Abstract] [SRC] 9.21Kb
«Inline JScript For x86 Cryptography» by hh86 [Abstract] [SRC] 5.25Kb
«Inside of Avp4» by Z0mbie [Abstract] 2.68Kb
«Inside the Mind of Dark Avenger» by Sarah Gordon [Abstract] 18.59Kb
«INT 0x80? No, thank you!» by herm1t [Abstract] [SRC] 14.86Kb
«The Internet Worm: Crisis and Aftermath» by Eugene Spafford [Abstract] 46.41Kb
«Interview with Alan Solomon» by Dark Fiber 9.04Kb
«Interview with Aurodreph/SLAM» by FoxZ 4.6Kb
«Interview with Benny/29A» [Abstract] 17.57Kb
«Interview with Billy Belcebu/iKX» by Benny 33.08Kb
«Interview with Blonde» by The Unforgiven 17.92Kb
«Interview with Cicatric» by Horny Toad 8.15Kb
«Interview with Cicatrix» [Abstract] 12.7Kb
«Interview with Cicatrix for Slam» by Virtual Daemon 10.67Kb
«Interview with Coke» [Abstract] 6.32Kb
«Interview with Crom-Cruach» by Trident 8.77Kb
«Interview with Cyclone» by T-2000 5.31Kb
«Interview with Dark Fiber» by Cicatrix 11.63Kb
«Interview with Dark Slayer» by Metabolis 4.71Kb
«Interview With Data Disruptor» by Soundmaster 3.59Kb
«Interview with DiA» by izee [Abstract] 12.53Kb
«Interview with Duke» [Abstract] 12.17Kb
«Interview with Eric Filiol» by SPTH [Abstract] 29.14Kb
«Interview with Eternal Maverick» by Cicatrix 6.22Kb
«Interview with Executioner» by Virtual Daemon 13.66Kb
«Interview with Foxz» by Cicatrix 6.21Kb
«Interview with genetix» by SPTH [Abstract] 14.1Kb
«Interview with Griyo» by IKX 20.37Kb
«Interview with herm1t» by Perforin [Abstract] 14.17Kb
«Interview with herm1t» by izee [Abstract] 12.78Kb
«Interview with hh86» by SPTH [Abstract] 9.19Kb
«Interview with Jerk1n» by FoxZ [Abstract] 4.17Kb
«Interview with John Tardy» by Trident 17.05Kb
«Interview with JPanic» by hh86, SPTH [Abstract] 26.85Kb
«Interview with Karl Sims» by SPTH [Abstract] 4.1Kb
«Interview with Kpv-Team» by FoxZ 4Kb
«Interview with Lovin God» by SeptiC [Abstract] 10.52Kb
«Interview with Lucifer/Messiah» by Sarah Gordon 33.85Kb
«Interview with Mark Stamp» by SPTH [Abstract] 15.79Kb
«Interview with Masud Khafir» by Trident 11.97Kb
«Interview with Metabolis» by Cicatrix 7.55Kb
«Interview with Mikee» by FoxZ [Abstract] 4.42Kb
«Interview with Mr. Sandman» by Bozo 27.14Kb
«Interview with Nucleii» by Knowdeth [Abstract] 6.56Kb
«Interview with Opic» by Cicatrix 14.93Kb
«Interview with person from AV company» [Abstract] 16.14Kb
«Interview with Peter Ferrie» by hh86, SPTH [Abstract] 20.35Kb
«Interview with Potti Rotti» by The Unforgiven 22.71Kb
«Interview with pr0mix» by SPTH [Abstract] 8.67Kb
«Interview with Retro» by izee [Abstract] 9.64Kb
«Interview with roy g biv» by hh86, SPTH [Abstract] [SRC] 18.82Kb
«Interview with RustBug for Slam» by Virtual Daemon 8.58Kb
«Interview with Sarah Gordon» by Gigabyte 8.08Kb
«Interview with Second Part To Hell» by alcopaul [Abstract] 13.83Kb
«Interview with SennaSpy» by T-2000 4.25Kb
«Interview with SMT» by Cicatrix 6.34Kb
«Interview with SnakeByte» by Necronomikon 8.12Kb
«Interview with SnakeByte» by SPTH [Abstract] 5.46Kb
«Interview with StarZer0/iKX» by Benny 23.17Kb
«Interview with Stefan Kurtzhals» by Nightmare Joker [Abstract] 8.31Kb
«Interview with Stormbringer» by T-2000 17.09Kb
«Interview with synge» by killkir 6.53Kb
«Interview with Tom Ray» by SPTH [Abstract] 11.63Kb
«Interview with Toro» by T-2000 5.62Kb
«Interview with Trigger» by Slam [Abstract] 7.43Kb
«Interview with Ultras» by T-2000 8.46Kb
«Interview with VirusBuster about 29A» by hh86, SPTH [Abstract] 16.96Kb
«Interview with WarGame» by SPTH [Abstract] 10.81Kb
«Interview with Wildworker» [Abstract] 3.18Kb
«Interview with with Doctor Owl» by Necronomikon 9.54Kb
«An Introduction to Encryption, Part I» by MidNyte [Abstract] 13.41Kb
«Introduction to macro viruses» by Alan Solomon [Abstract] 21.24Kb
«An Introduction to Non-Overwriting Virii» by Dark Angel [Abstract] 37.97Kb
«Introduction to Randomly Evolving Machinecode» by Tom Van Braeckel [Abstract] [SRC] 28.49Kb
«Invasion of the Data Snatchers» by Philip Elmer-DeWitt [Abstract] 25.82Kb
«Inversing a random numbers» by herm1t [Abstract] [TeX] [SRC] 7.21Kb
«Invisibility on NT boxes, How to become unseen on Windows NT (Version: 1.2)» by Holy_Father [Abstract] 50.49Kb
«Is Java still secure?» by David Chess, John Morar [Abstract] 33.02Kb
«Is virus writing really that bad?» by Paul Ducklin [Abstract] 23.91Kb
«Is Your Cat Infected with a Computer Virus?» by Melanie Rieback, Bruno Crispo, Andrew Tanenbaum [Abstract] [SRC] 45.92Kb
«It Came from Outer Space: The Virus, Cultural Anxiety, and Speculative Fiction» by Anne-Marie Thomas [Abstract] 106.13Kb
«It's a bird, it's a plane, it's Fooperman» by Peter Ferrie [Abstract] 18.43Kb
«It's the End of the World (as we know it)» by Alan Solomon [Abstract] 18.73Kb
«It's zell(d)ome the one you expect» by Peter Ferrie, Heather Shannon [Abstract] 22.71Kb

J

«Java Class infection from PE32 files» by hh86 [Abstract] [SRC] 6.25Kb
«Java, ActiveX and the Virus Threat» by Alan Solomon [Abstract] 8.86Kb
«Jerk1N's Tutorial Series» by Jerk1N 22.21Kb
«Join us now and share the malware...» by zert [Abstract] [SRC] 49.75Kb
«Joy of reproduction» by Dennis Ritchie [Abstract] 1.41Kb
«JScript Prototypes» by roy g biv [Abstract] [SRC] 5.43Kb

K

«Kernel function hijacking» by Silvio Cesare [Abstract] 2.5Kb
«Killer Apps» by Sasha Segan [Abstract] 8.39Kb
«Kolmogorov Complexity Estimates For Detection Of Viruses In Biologically Inspired Security Systems: A Comparison With Traditional Approaches» by Sanjay Goel, Stephen Bush [Abstract] [TeX] 99.08Kb

L

«Language, a virus?» by Florian Cramer [Abstract] 13.17Kb
«Leaps and Bounds» by Peter Ferrie [Abstract] [SRC] 11.69Kb
«Legal Options To Computer Viruses» by Bernard Zajac [Abstract] 8.3Kb
«The Legislative Response to the Evolution of Computer Viruses» by Mark Colombell 63.48Kb
«Let them eat brioche» by Peter Ferrie [Abstract] 6.79Kb
«Let's talk Stealth» by Stomach Contents [Abstract] 15.86Kb
«Limits of Static Analysis for Malware Detection» by Andreas Moser, Christopher Kruegel, Engin Kirda [Abstract] [TeX] 55.71Kb
«Linux anti-debugging techniques (fooling the debugger)» by Silvio Cesare [Abstract] 5.55Kb
«Linux Trojan “Hand of Thief” ungloved» by Peter Kálnai [Abstract] 9.42Kb
«Linux virus writing tutorial» by mandragore [Abstract] [SRC] 15.8Kb
«Linux Worms - some ideas» by SnakeByte [Abstract] 10.13Kb
«Linux x64 Infection for Lamers (by a Lamer)» by JPanic [Abstract] [SRC] 52.31Kb
«Lions and Tigraas» by Peter Ferrie [Abstract] 5.44Kb
«The Little Black Book of Computer Viruses» by Mark Ludwig [Abstract] 215.15Kb
«Little SYS Infection Tutorial» by Int13h [Abstract] 10.31Kb
«Look at that escargot» by Peter Ferrie [Abstract] 6.61Kb
«Looking a Bagift-Horse in the Mouth» by Peter Ferrie, Frédéric Perriot [Abstract] 10.73Kb
«Ludwig Shelters Under First Amendment» [Abstract] 3.04Kb

M

«Macro Virus Heuristics» by Alan Solomon [Abstract] 1.55Kb
«Macro virus identification problems» by Vesselin Bontchev [Abstract] [SRC] 82.14Kb
«Macro virus trickz» by Jacky Qwerty [Abstract] 15.23Kb
«The macro virus writing tutorial» by Dark Night 12.67Kb
«Macro-Viruses: Genesis, Truth about the Threat and Methods of Protection» by Andy Nikishin, Mike Pavluschik, Denis Zenkin [Abstract] 18.74Kb
«Magisterium Abraxas» by Peter Ferrie [Abstract] 10.87Kb
«Making Windows 95 Compatible Viruses» by Yosha [Abstract] [SRC] 6.53Kb
«Malicious code: An ethical dilemma» by Glenn Watt [Abstract] 22.78Kb
«Malicious Mobile Code: Virus Protection for Windows» by Roger Grimes [Abstract]
«Malware Statistical analysis and countermeasures» by M0SA [Abstract] 8.95Kb
«Marginal Networks: The Virus between Complexity and Suppression» by Roberta Buiani [Abstract] 45.48Kb
«Mark A. Washburn - Walking the Research Tightrope» by Jim Bates [Abstract] 10.47Kb
«Marketing Virus: The new age of malixious programs» by Silent Supporter [Abstract] 5.86Kb
«The Masquerader» by hh86 [Abstract] [SRC] 3.85Kb
«Mathematical Model of Computer Viruses» by Ferenc Leitold [Abstract]
«A Mathematical Theory for the Spread of Computer Viruses» by Winfried Gleissner [Abstract] [TeX] 22.69Kb
«Matlab.MicrophoneFever2» by SPTH [Abstract] [SRC] 85.01Kb
«Mayhem - a hidden threat for *nix web servers» by Andrew Kovalev, Konstantin Otrashkevich, Evgeny Sidorov [Abstract] 35.79Kb
«MEANDERINGS: Theory On batch Keylogging» by cOrRuPt G3n3t!x [Abstract] 7.36Kb
«Mechanics of Self-reproduction» by Lionel Sharples Penrose [Abstract] [TeX] 38.14Kb
«Memory Stealth» by Rock Steady [Abstract] 3.5Kb
«MenuetOS infection» by SPTH [Abstract] 31.15Kb
«Metamorphism» by Lord Julus [Abstract] [SRC] 27.25Kb
«Metamorphism (part 1)» by Z0mbie [SRC] 30.38Kb
«Metamorphism and Self-Compilation in JavaScript» by SPTH [Abstract] [SRC] 17.84Kb
«Metamorphism in practice or "How I made MetaPHOR and what I've learnt"» by The Mental Driller [Abstract] [SRC] 66.25Kb
«Metamorphism, Formal Grammars and Undecidable Code Mutation» by Eric Filiol [Abstract] [TeX] 37.47Kb
«The metamorphosis of malware writers» by Danny Bradbury [Abstract] 10.22Kb
«Microsoft .NET Common Language Runtime Overview» by Benny [Abstract] [SRC] 14.69Kb
«Mid-Infection on relocations» by b0z0 [Abstract] 24.32Kb
«The missing LNK» by Peter Ferrie [Abstract] 14.34Kb
«Models of Practical Defenses Against Computer Viruses» by Fred Cohen [Abstract] 39.65Kb
«Modern Day ELF Runtime infection via GOT poisoning» by Ryan O'Neill [Abstract] [SRC] 92.41Kb
«Modern Methods of Detecting and Eradicating Known and Unknown Viruses» by Dmitry Mostovoy [Abstract] 12.04Kb
«Modern operating systems» by Andrew Tanenbaum [Abstract] 58.13Kb
«Modular worms» by Viktor Grichenko [Abstract] 22.98Kb
«Monad: Microsoft Command Shell Infection Tutorial» by SPTH [Abstract] [SRC] 10.35Kb
«Morality and Technology, or Is it Wrong to Create and Let Loose a Computer Virus» by Urs Gattiker, Helen Kelley [Abstract] 57.67Kb
«More Ins and Outs of JunkMail» by roy g biv [Abstract] [SRC] 9.08Kb
«Mostly harmless» by Peter Ferrie, Frédéric Perriot [Abstract] 16.23Kb
«The motivation behind computer viruses» by Patrick Carnahan, Dusty Roberts, Zack Shay, Jeff Yeary [Abstract] 35.18Kb
«Movement of Viruses» by Sung Yang [Abstract] 5.76Kb
«Mr. Washburn’s Explanation» by Edward Wilding [Abstract] 3.61Kb
«MSIL-PE-EXE infection strategies» by Benny [Abstract] 10.1Kb
«Multi-Platform Viruses Made Easy - A Case Study» by JPanic [Abstract] 9.96Kb
«Mutation Engine Report» by Tarkan Yetiser [Abstract] 25.22Kb
«Mutation Engines» by JHB [Abstract] 8.14Kb
«My Thought on the Proposed Legislation to make Virus Code Illegal in the U.S.A.» by Matt Miller [Abstract] 5.78Kb
«MyDoom and You» by Richard Stallman [Abstract] 3.91Kb

N

«Naming your Viruses» by Rajaat [Abstract] 10.2Kb
«Neophyte's Macro Virus Tutorial» by Neophyte [Abstract] 79.34Kb
«Neural Networks for Computer Virus Recognition» by Gerald Tesauro, Jeffrey Kephart, Gregory Sorkin [Abstract] 7.41Kb
«Neuromancer» by William Gibson [Abstract] 456.97Kb
«New anti-debugging possibilities» by izee [Abstract] [SRC] 9.77Kb
«New era of bootsectorviruses #1: FAT12 IMG infection at Disks» by SPTH [Abstract] [SRC] 17.06Kb
«A New Virus Naming Convention» by Fridrik Skulason, Vesselin Bontchev [Abstract] 9.51Kb
«A new, completely transparent method of deactivating/reactivating VSAFE» [Abstract] 2.26Kb
«No War Machine» by Stuart Moulthrop [Abstract] 63.77Kb
«Noisy Waves: TRNG virus» by (o) [Abstract] [SRC] 5.16Kb
«Not teaching viruses and worms is harmful» by George Ledin [Abstract] 4.67Kb
«Not worthy» by Peter Ferrie [Abstract] 4.81Kb
«A note on Cohen's formal model for computer viruses» by Kimmo Kauranen, Erkki Makinen [Abstract] [TeX] 8.41Kb
«A Note On High Integrity PC Bootstrapping» by Fred Cohen [Abstract] 15.62Kb
«NOTE Segment Infection technique» by Cyneox [Abstract] [SRC] 4.29Kb
«Notes from the virus Underground...» by Kim Neely [Abstract] 29.76Kb
«NtVDM under WinNT/2k/XP» by Ratter [Abstract] [SRC] 8.44Kb

O

«Of worms, viruses and Core War» by Alexander Dewdney 21.28Kb
«On the definition and classification of cybercrime» by Sarah Gordon, Richard Ford [Abstract] 37.98Kb
«On the Implications of Computer Viruses and Methods of Defense» by Fred Cohen [Abstract] 61.04Kb
«On the Time Complexity of Computer Viruses» by Zhihong Zuo, Mingtian Zhou, Qing-xin Zhu [Abstract] [TeX] 40.53Kb
«Opcode Frequency Statistics» by Z0mbie [Abstract] 8.82Kb
«Open problems in computer virology» by Eric Filiol, Marko Helenius, Stefano Zanero [Abstract] [TeX] 67.91Kb
«Open Problems in Computer Virus Research» by Steve White [Abstract] 40.95Kb
«Opening NT boxes for you and your comrades in arms» by Ratter [Abstract] [SRC] 4.27Kb
«An organisational solution to piracy and viruses» by Harold Thimbleby [Abstract] 39.15Kb
«Origin of the Cookie Monster» by Chris Tavares [Abstract] 3.38Kb
«Other techniques of polymorphism» by flush, MGL [Abstract] 8.36Kb
«Out of Office Responses» by roy g biv [Abstract] [SRC] 29.46Kb
«Outside people» by Slagehammer [Abstract] 3.28Kb
«Over-File Splitting» by SPTH [Abstract] [SRC] 8.92Kb
«An Overview of Computer Viruses in a Research Environment» by Matt Bishop [Abstract] 84.03Kb
«Overwriting virus tutorial #1» by RatBoy [Abstract] 11.12Kb

P

«A Pact with the Devil» by Mike Bond, George Danezis [Abstract] 37.99Kb
«Painting the Internet: A Different Kind of Warhol Worm» by John Aycock [Abstract] 25.38Kb
«Panic computing: The viral metaphor and computer technology» by Deborah Lupton 39.31Kb
«Paradise lost» by Peter Ferrie, Frédéric Perriot [Abstract] 12.48Kb
«Past, Present and Future of Batch» by SPTH [Abstract] [SRC] 10.67Kb
«PE Infection school» by JHB [Abstract] 5.92Kb
«PE Infector» by Marco Ramilli [Abstract] [SRC] 4.77Kb
«Per-process residency review: common mistakes» by Bumblebee [Abstract] 10.28Kb
«Perceptions of computer viruses: a cross-cultural assessment» by Mary Jones, Kirk Arnett, Jeung-Tai Eddie Tang, Nian-Shing Chen [Abstract] 22.01Kb
«Perfect Internet-Worm via VisualBasic Script» by SPTH [Abstract] [SRC] 7.55Kb
«Perl EPO Techniques» by SnakeByte [Abstract] [SRC] 6.16Kb
«Permission to infect, sir?» by MidNyte [Abstract] 3.38Kb
«Permutation conditions» by Z0mbie [Abstract] 10.11Kb
«Perusing The Virus Author Mentality» by Lord Julus [Abstract] 10.98Kb
«Pervert world wide» by Z0mbie [Abstract] 2.64Kb
«PHP Virus Writing Guide» by SPTH [Abstract] 37.23Kb
«Phunky Virus Writing Guide» by Dark Angel [Abstract] 106.07Kb
«Phunny stuff with your cursor» by jack twoflower [Abstract] 6.65Kb
«Piggyback» by Kernel Panik [Abstract] [SRC] 7.08Kb
«A pilot study on college student's attitudes toward computer virus» by Eric Zhi-Feng Liu [Abstract] 8.16Kb
«A Plague of Viruses: Biological, Computer and Marketing» by Jeffrey Boase, Barry Wellman [Abstract] 49.27Kb
«A platform independent computer virus» by Keith Allen McMillan [Abstract] 51.73Kb
«Playing 'Hide and Seek'» by "Q" the Misanthrope [Abstract] 11.67Kb
«Plumbing the Depths» by Alan Solomon [Abstract] 9.3Kb
«Polymorphic Batch» by roy g biv [Abstract] [SRC] 11.25Kb
«Polymorphic Compilation (just some crazy thoughts)» [Abstract] 6.94Kb
«Polymorphic file virus BEETLE» by pest [Abstract] [SRC] 11.33Kb
«Polymorphic Games» by Z0mbie [SRC] 7.91Kb
«Polymorphic Viruses - Implementation, Detection, and Protection» by Tarkan Yetiser [Abstract] 13.84Kb
«Polymorphism - A Discussion Of Methodology And Implementation» by Buz [Abstract] 21Kb
«Polymorphism - Analysis on the decryptor generator 1.5» by Lord Julus [Abstract] 63.29Kb
«Polymorphism and grammars» by Wintermute [Abstract] 21.82Kb
«Polymorphism In Batch» by cOrRuPt G3n3t!x [Abstract] 7.77Kb
«Polymorphism in BatXP» by SPTH [Abstract] [SRC] 9.86Kb
«Polymorphism in Perl Viruses» by SnakeByte [Abstract] [SRC] 5.99Kb
«Polymorphism using the Microsoft Script Encoder» by roy g biv [Abstract] [SRC] 6.9Kb
«Polymorphism: Level 6B (Polymorphism: Chaotic Permutations)» by Changeling [Abstract] 10.17Kb
«Popp Goes The Weasel» by Edward Wilding [Abstract] 9.07Kb
«Possible Virus Attacks Against Integrity Programs And How To Prevent Them» by Vesselin Bontchev [Abstract] 56.66Kb
«Post discovery strategies» by Sepultura [Abstract] [SRC] 36.14Kb
«Practical DNS-Amplification» by MZh [Abstract] [SRC] 13.99Kb
«Prescription Medicine» by Peter Ferrie [Abstract] 22.41Kb
«Preserving Infections» by Sepultura [Abstract] 17.25Kb
«Principles of a Computer Immune System» by Anil Somayaji, Steven Hofmeyr, Stephanie Forrest [Abstract] 33.75Kb
«Productivity, Technology and AntiVirus Industry» by Sung Yang [Abstract] 29.86Kb
«A program called MICE nibbles its way to victory at the first Core War tournament» by Alexander Dewdney 16.16Kb
«Prophet and loss» by Peter Ferrie 15Kb
«Prosecuting Computer Virus Authors: The Need for an Adequate and Immediate International Solution» by Kelly Cesare [Abstract] 146.3Kb
«Protected Mode Supervisor?» by Igor Daniloff [Abstract] [SRC] 15.92Kb
«Protection of Computer Systems from Computer Viruses: Ethical and Practical Issues» by Bruce Neubauer, James Harris [Abstract] 27.59Kb
«Protection Schemes Based on Virus Survival Techniques» by Jeffrey Walton [Abstract] 88.04Kb
«The protector scene» by Kalkin/EViL [Abstract] 3.22Kb
«Python Virus Writing Tutorial» by VortX [Abstract] [SRC] 8.58Kb

Q

«Quines - theory and practice» by roy g biv [Abstract] [SRC] 106.92Kb

R

«The race against malicious software» by Timothy Arulsuthan [Abstract] 12.68Kb
«A Radical New Approach to Virus Scanning» by Joe Wells [Abstract] 111.14Kb
«Raised hacklez» by Peter Ferrie [Abstract] 19.22Kb
«Rebels for the System? Virus writers, general intellect, cyberpunk and criminal capitalism» by Mathieu O'Neil [Abstract] 55.55Kb
«Recent Worms: A Survey and Trends» by Darrell Kienzle, Matthew Elder [Abstract] 54.56Kb
«Recompiling the metamorphism» by herm1t [Abstract] [SRC] 17.85Kb
«Reductions of the general virus detection problem» by Ferenc Leitold [Abstract] [TeX] 16.78Kb
«Reflections on Some Recent Widespread Computer Break-Ins» by Brian Reid 11.38Kb
«Reflections on Trusting Trust» by Ken Thompson [Abstract] 11.01Kb
«Register Initialising Using Only Arithmetic Instructions» by roy g biv [Abstract] [SRC] 6.42Kb
«The Regulation of Virus Research and the Prosecution for Unlawful Research?» by Alistair Kelman [Abstract] 13.09Kb
«Reliable Identification of Bounded-length Viruses is NP-complete» by Diomidis Spinellis [Abstract] [TeX] [SRC] 26.22Kb
«Remote Polymorphism and Customized Viruses» by freeon [Abstract] 8.17Kb
«Reply to `Comment on "A Framework for Modelling Trojans and Computer Virus Infection"' by E. Mäkinen» by Harold Thimbleby, Stuart Anderson, Paul Cairns [Abstract] 11.41Kb
«Reply to `Comment on "A Framework for Modelling Trojans and Computer Virus Infection"' by E. Mäkinen» by Fred Cohen [Abstract] 7.13Kb
«The results of the Contest for the Best Virus Definition in technical categories» by Suzana Stojakovic-Celustka [Abstract] 8.55Kb
«Retro the easy way» by MidNyte [Abstract] [SRC] 3.97Kb
«Retro-Virus» by Lawrence Schoen [Abstract] 11.02Kb
«Retroviruses - How viruses fight back» by Mikko Hyppönen [Abstract] 29.93Kb
«Revenge of the nerds» by Nicholas Martin [Abstract] 11.48Kb
«Reverse of a coin: A short note on segment alignment» by herm1t [Abstract] [SRC] 8.72Kb
«RFC1135: The Helminthiasis of the Internet» by Joyce Reynolds [Abstract] 67.12Kb
«Ring0 under WinNT/2k/XP» by Ratter [Abstract] 14.08Kb
«Ripping Source» by Metabolis [Abstract] 3.25Kb
«The Risk of Debug Codes in Batch: what are debug codes and why they are dangerous?» by ZeroP [Abstract] [SRC] 6.21Kb
«The road less truvelled» by Peter Ferrie [Abstract] 9.7Kb
«Rogue Computer Programs - Viruses, Worms, Trojan Horses and Time Bombs: Prank, Prowess, Protection or Prosecution?» by Anne Branscomb [Abstract] 125.04Kb
«RUBY Virus Writing Guide» by SPTH [Abstract] [SRC] 35.18Kb
«Run-Time Compiling» by Retro [Abstract] [SRC] 4.41Kb
«Runtime kernel kmem patching» by Silvio Cesare [Abstract] 29.39Kb

S

«Save your fingers - get your fake names from the i-net» by DiA [Abstract] [SRC] 15.03Kb
«Scan-strings, how they work and how to avoid them» by Dark Angel [Abstract] 7.01Kb
«Scanners of The Year 2000: Heuristics» by Dmitry Gryaznov [Abstract] 37.23Kb
«The Scarred Man» by Gregory Benford [Abstract] 44.77Kb
«Scary Networks? Viruses as Discursive Practice» by Roberta Buiani 19.83Kb
«Screwing People Over the Aristotle Style» by Rock Steady [Abstract] 8.22Kb
«The Search for Den Zuk» by Fridrik Skulason [Abstract] 7.34Kb
«Secrets & Lies: Digital Security in a Networked World (excerpt)» by Bruce Schneier [Abstract] 20.06Kb
«The Secure Virus-Copy» by SPTH [Abstract] [SRC] 8.29Kb
«Security in Agent Systems» by David Chess [Abstract] 21.81Kb
«Self Checking Executable Files» by Demogorgon [Abstract] 9.81Kb
«Self-crypting script files» by roy g biv [Abstract] [SRC] 13.74Kb
«Self-Replicating Turing Machines and Computer Viruses» by Elise de Doncker [Abstract] [TeX] 17.25Kb
«A Self-reproducing Analogue» by Lionel Sharples Penrose, Roger Penrose [Abstract] 3.71Kb
«Senders, Receivers and Deceivers: How Liar Codes Put Noise Back on the Diagram of Transmission» by Tony Sampson [Abstract] 13.21Kb
«A Sense of Self for Unix Processes» by Stephanie Forrest, Steven Hofmeyr, Anil Somayaji, Thomas Longstaff [Abstract] [TeX] 47.66Kb
«Server -> Client Communtication for Preprocessor languages (PHP)» by SPTH [Abstract] [SRC] 5.7Kb
«Several things to learn more (knowledge and code snippets)» by The Mental Driller [Abstract] [SRC] 10.51Kb
«SFP revisited» by Ratter [Abstract] [SRC] 6.54Kb
«Shared library call redirection using ELF PLT infection» by Silvio Cesare [Abstract] 33.36Kb
«Sheep: Fact or Fiction» by Sarah Gordon 2.89Kb
«The Shockwave Rider» by John Brunner [Abstract] 497.3Kb
«A Short Course on Computer Viruses» by Fred Cohen [Abstract] [TeX] [SRC] 558.44Kb
«The short monologue of virus Wendell from his small 120 megabytes world» by Int13h [Abstract] [SRC] 12.65Kb
«Should We Teach Virus Writing?» by Vesselin Bontchev [Abstract] 47.27Kb
«A simple way to detect VirtualBox» by WarGame [Abstract] [SRC] 2.17Kb
«Simple worm in delphi and corrections» by Hutley [Abstract] [SRC] 7.1Kb
«Single Stepping Tunnel Techniques» by Dark Fiber 21.41Kb
«SirCamstantial Evidence» by Peter Ferrie, Péter Ször [Abstract] 13.54Kb
«Situation in VX scene» by Benny [Abstract] 10.05Kb
«Slade's Virus Books Reviews» by Robert Slade [Abstract] [SRC] 190.8Kb
«Sleep-Inducing» by Peter Ferrie [Abstract] 10.92Kb
«Snorting coke (and packets)» by GriYo [Abstract] [SRC] 6.34Kb
«Snow Crash» by Neal Stephenson [Abstract] 908.47Kb
«Sobig, sobigger, sobiggest» by Peter Ferrie [Abstract] 27.32Kb
«The Social Psychology of Computer Viruses and Worms» by Jonathan Rusch [Abstract] 51.53Kb
«The solution in the naming chaos» by Ferenc Leitold [Abstract] 31.79Kb
«Solving Plain Strings Problem In HLL» by Z0mbie [Abstract] 13.43Kb
«Some Further Theoretical Results about Computer Viruses» by Zhihong Zuo, Mingtian Zhou [Abstract] [TeX] 41.79Kb
«Some human dimensions of computer virus creation and infection» by Andy Bisset, Geraldine Shipton [Abstract] 52.37Kb
«Some ideas about metamorphism» by Z0mbie [Abstract] 5.41Kb
«Some ideas about OpenOffice infection» by WarGame [Abstract] [SRC] 7.41Kb
«Some ideas to increase detection complexity» by SPTH [Abstract] [SRC] 13.62Kb
«Some ideaz about future worm» by Benny [Abstract] 3.87Kb
«Some New Ideaz for Future Viruses» by allegro [Abstract] 4.63Kb
«Some politically incorrect words about the so-called "scene"» by Spanska [Abstract] 15.34Kb
«Some stealth idea's» by DiA [Abstract] [SRC] 7.75Kb
«Some stuff» by Lord Julus [Abstract] 8.67Kb
«Somehow we should... Web 2.0» by SPTH [Abstract] 3.52Kb
«Something smells fishy» by Peter Ferrie [Abstract] 5.15Kb
«The Spam Book: On Viruses, Porn and Other Anomalies From the Dark Side of Digital Culture» by Tony Sampson, Jussi Parikka [Abstract] 855.82Kb
«A Specter Is Haunting Networks - The Specter of Viruses, Hidden in Horses» by David Buerger [Abstract] 4.8Kb
«Stalking a Computer Virus» by Wallace Wang [Abstract] 9.03Kb
«Stalking the Wily Hacker» by Cliff Stoll [Abstract] 70.89Kb
«The StarOffice Basic» by roy g biv [Abstract] [SRC] 5.41Kb
«Static linked ELF infecting» by Ares [Abstract] [SRC] 10.44Kb
«Stealth API-based decryptor» by kaze [Abstract] [SRC] 24.1Kb
«Sterling vs. Virus Writers» by Bruce Sterling 6.46Kb
«A strange story» by Bernd Fix [Abstract] 19.42Kb
«Striking Similarities» by Peter Ferrie, Frédéric Perriot, Péter Ször [Abstract] 11.64Kb
«Stripping down an AV engine» by Igor Muttik [Abstract] 31.96Kb
«Strong Cryptography Armoured Computer Viruses Forbidding Code Analysis: the BRADLEY virus» by Eric Filiol [Abstract] [TeX] 32.91Kb
«A study of anti-virus' response to unknown threats» by Christophe Devine, Nicolas Richaud [Abstract] 34.55Kb
«Stux in a rut: Why Stuxnet is boring» by John Aycock [Abstract] 16.83Kb
«Subtle SEH» by roy g biv [Abstract] [SRC] 4.38Kb
«SubVirt: Implementing malware with virtual machines» by Samuel King, Peter Chen, Yi-Min Wang, Chad Verbowski, Helen Wang, Jacob Lorch [Abstract] 64.14Kb
«Supercompilation for Equivalence Testing in Metamorphic Computer Viruses Detection» by Alexei Lisitsa, Matt Webster [Abstract] [TeX] 15.66Kb
«Superworms and Cryptovirology: a Deadly Combination» by Ivan Balepin [Abstract] 28.75Kb
«Surrealism in viruswriting: How to create new ideas» by SPTH [Abstract] 4.48Kb
«Synners» by Pat Cadigan [Abstract] 939.8Kb
«SYP.01: Bypassing Online Dynamic Analysis Systems» by M0SA [Abstract] [SRC] 9.09Kb
«SysCall redirection without modifying the SysCall table» by Silvio Cesare [Abstract] [SRC] 2.38Kb
«System file tables and their usage» by Dark Angel [Abstract] 9.5Kb

T

«Taking the redpill: Artificial Evolution in native x86 systems» by SPTH [Abstract] [TeX] [SRC] 41.93Kb
«A Taxonomy of Computer Worms» by Nicholas Weaver, Vern Paxson, Stuart Staniford, Robert Cunningham [Abstract] 45.5Kb
«TBMEM FLAWS» by Darkman [Abstract] 8.35Kb
«Techniques a worm might use to be harder to locate» by One Semicolon [Abstract] [SRC] 37.64Kb
«Technological Networks and the Spread of Computer Viruses» by Justin Balthrop, Stephanie Forrest, M. Newman, Matthew Williamson [Abstract] 13.82Kb
«Technological Turf Wars: A Case Study of the Computer Antivirus Industry» by Jessica Johnston [Abstract] 485.43Kb
«Technologically Enabled Crime: Shifting Paradigms for the Year 2000» by Sarah Gordon [Abstract] 54.79Kb
«Theory Of Better File Virus Distribution (a study in new ideas?)» by VicodinES 10.79Kb
«The theory of building large p2p botnets» by pest [Abstract] [SRC] 8.93Kb
«There Are No Safe Virus Tests» by William Dowling [Abstract] [TeX] 4.49Kb
«There's A Virus In My Software» by Philip Hilts [Abstract] 9.99Kb
«This sig doesn't run» by Peter Ferrie [Abstract] 10.74Kb
«Thoughts about Morphology in viruses» by SPTH [Abstract] 5.27Kb
«Thoughts About The Use Of Garbage Instructions In Polymorphism» by The Sorcerer [Abstract] [TeX] [SRC] 4.61Kb
«A Threat from Malicious Software» by Jamie Murphy [Abstract] 6.16Kb
«Threats to Digitization: Computer Virus» by Bhaskar Mukherjee [Abstract] 30.38Kb
«Thunderbyte Residency Test» by Rhincewind [Abstract] 2.31Kb
«Time machine» by Peter Ferrie [Abstract] 11.18Kb
«To catch Efish» by Peter Ferrie, Frédéric Perriot [Abstract] [SRC] 11.1Kb
«To sara gordon Or Not To sara gordon, That Is The Question» by Rock Steady [Abstract] 24.72Kb
«A Tour of the Worm» by Donn Seeley [Abstract] 68.37Kb
«Toward an abstract computer virology» by Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves Marion [Abstract] [TeX] [SRC] 42.82Kb
«Tracing under Win32» by Z0mbie [SRC] 7.06Kb
«Transmission» by Hari Kunzru [Abstract] 537.63Kb
«Trends In Computer Virus Research» by Fred Cohen [Abstract] 73.89Kb
«Tricks to make your macro virus unscannable» by jack twoflower [Abstract] 10.45Kb
«Trojans, Worms and Spyware: A Computer Security Proffesional's Guide to Malicious Code» by Michael Erbschloe [Abstract]
«The True Computer Parasite» by Steven Furnell, Jeremy Ward [Abstract] 23.68Kb
«The true Export/Import business» by hh86 [Abstract] [SRC] 3.16Kb
«Tumours and polips» by Peter Ferrie [Abstract] 23.51Kb
«Tunneling Document #4 (Development of Emulation Systems)» by Methyl [Abstract] 152.48Kb
«Twinkle, twinkle little star» by Peter Ferrie [Abstract] 17.93Kb

U

«UMB Residency» by Dark Angel [Abstract] [SRC] 5.69Kb
«Un combate con el Kerñado» by Peter Ferrie [Abstract] 9.75Kb
«The UNDERGROUND MS WORD 6.x MACRO VIRUSES FAQ V2.0» by Aurodreph 24.06Kb
«Understanding and Managing Polymorphic Viruses» by Carey Nachenberg [Abstract] 19.68Kb
«Understanding encryption and polymorphism» by Joe Wells [Abstract] [SRC] 14.14Kb
«An Undetectable Computer Virus» by David Chess, Steve White [Abstract] [TeX] [SRC] 19.54Kb
«Unexpected Resutls [sic]» by Peter Ferrie [Abstract] 9.33Kb
«A unified prediction of computer virus spread in connected networks» by Lora Billings, William Spears, Ira Schwartz [Abstract] [TeX] 25.11Kb
«The Universal Viral Machine: Bits, Parasites and the Media Ecology of Network Culture» by Jussi Parikka [Abstract] 75.43Kb
«Unix ELF parasites and virus» by Silvio Cesare [Abstract] 34.86Kb
«UNIX SH and BASH shell viruses» by Gobleen Warrior [Abstract] [SRC] 33.91Kb
«Unix viruses» by Silvio Cesare [Abstract] 49.59Kb
«An unofficial analysis of the Retaliation Virus (Authored by JPanic)» by Ryan O'Neill [Abstract] [SRC] 52.7Kb
«Unpredictable Legacies: Viral Games in the Networked World» by Roberta Buiani [Abstract] 71.86Kb
«Up to Date with the URLDownloadToFileA API» by DiA [Abstract] [SRC] 11.51Kb
«Upper memory residency» by IntrusO [Abstract] 14.39Kb
«The urge of creation» by Asmodeus [Abstract] 9.43Kb
«Use of an "Attenuated" Computer Virus as a Mechanism for Teaching Epidemiology» by Gail Snitkoff, Dudley Moon, Mark Smith [Abstract] 17.41Kb
«Useful things in Batch» by SPTH [Abstract] [SRC] 7.66Kb
«Using Code Normalization for Fighting Self-Mutating Malware» by Danilo Bruschi, Lorenzo Martignoni, Mattia Monga [Abstract] [TeX] [SRC] 43.98Kb
«Using CUDA PTX for decryption» by hh86 [Abstract] [SRC] 7.04Kb
«Using Skype for VX» by WarGame [Abstract] [SRC] 3.04Kb
«Using Structured Exception Handler (SEH)» by Billy Belcebú [Abstract] [SRC] 3.54Kb
«Using the .NET runtime compiler for file infection» by DiA [Abstract] [SRC] 13.98Kb

V

«VBA viruses and trojans» by Leugim San 10.52Kb
«Veni, Vidi, Vicis?» by Vesselin Bontchev [Abstract] [SRC] 12.68Kb
«The Violator Virus - Burger’s Continuing Legacy» by Edward Wilding [Abstract] 11.91Kb
«Viral Attacks On UNIX System Security» by Tom Duff [Abstract] 28.16Kb
«Viral Bodies, Virtual Practices» by Monica Hulsbus [Abstract] 30.74Kb
«Viral code "association"» by Robert Slade 2.76Kb
«The Viral Darwinism of W32.Evol» by Orr [Abstract] [SRC] 58.69Kb
«The Viral Mind: Understanding the Motives of Malicious Coders» by D. D. Shelby [Abstract] 16.43Kb
«Viral Noise and the (Dis)Order of the Digital Culture» by Jussi Parikka 15.64Kb
«Viral polymorphism» by Stephen Pearce [Abstract] 23.63Kb
«Viral Technology Past, Present, Future» by Methyl [Abstract] 26.67Kb
«VIRETHIC. Viral Morality: A Call for Discussion» by Robert Slade [Abstract] 22.68Kb
«Viric life and die theories» by Billy Belcebú [Abstract] [SRC] 12.75Kb
«Virii Generators: Understanding the Threat» by James Tarala [Abstract] 35.06Kb
«The virmaking is dying» by Z0mbie [Abstract] 2.07Kb
«Virology 101» by Douglas McIlroy 15.31Kb
«The Virtual Artaud: Computer Virus as Performance Art» by Jason Farman [Abstract] 26.01Kb
«Virtual Code» by roy g biv [Abstract] 6.29Kb
«VirtualBox's Virtual Disks Infection» by WarGame [Abstract] [SRC] 23.4Kb
«Virus» by Bill Buchanan 697.72Kb
«Virus attacks can come from strange places» by Timothy Barmann 6.44Kb
«Virus Based Products» by Fred Cohen [Abstract] 2.58Kb
«Virus Censorship» by DecimatoR [Abstract] 7.67Kb
«The Virus Creation Labs» by Horny Toad [Abstract] [SRC] 4.64Kb
«The Virus Creation Labs: A Journey into the Underground» by George Smith [Abstract] [SRC] 353.49Kb
«Virus Cryptoanalysis» by Mircea Ciubotariu [Abstract] 10.27Kb
«Virus Culture» by Jeffrey Weinstock [Abstract] 37.57Kb
«Virus DATabase» by Cicatrix [Abstract]
«Virus Detection Alternatives» by Patrick Min [Abstract] 37.67Kb
«Virus engines: common recomendations (3rd edition)» by Z0mbie [Abstract] 14.38Kb
«Virus ex machina res ipsa loquitur» by Meiring De Villiers [Abstract] [TeX] 197.86Kb
«Virus in C» by Black Wolf [Abstract] 10.44Kb
«A Virus in Info-Space: the open network and its enemies» by Tony Sampson 13.97Kb
«Virus infecting the mIRC» by Hutley [Abstract] [SRC] 4.73Kb
«Virus Juice: squeezing bash to get it, another little shell script virus tutorial» by zert [Abstract] [SRC] 58.29Kb
«Virus oriented VxD writing tutorial» by GriYo [Abstract] 20.75Kb
«Virus Payloads - History and Payload Mentality» by Rott_En [Abstract] 14.04Kb
«Virus Software and the First Amendment» by Mary-Frances Panettiere [Abstract] 8.47Kb
«Virus Spreading - Fast Or Slow?» by Nick Haflinger [Abstract] 3.79Kb
«The Virus Underground» by Clive Thompson [Abstract] 43.51Kb
«Virus Verification and Removal Tools and Techniques» by David Chess [Abstract] 23.51Kb
«Virus Wars: A Serious Warning» by John Dvorak [Abstract] 4.13Kb
«Virus Writer and Distributors» by Jan Hruska [Abstract] 15.01Kb
«Virus writers in the wild» by Marcia Wilson [Abstract] 8.09Kb
«Virus Writers: The End of The Innocence?» by Sarah Gordon [Abstract] 65.45Kb
«Virus Writers: Who Writes This Stuff Anyway?» by Scott Dewing [Abstract] 6.25Kb
«Virus! The Secret World of Computer Invaders That Breed and Destroy» by Allan Lundell
«Viruses 101» by John Aycock, Ken Barker [Abstract] 25.93Kb
«Viruses and Criminal Law» by Michael Gemignani 13.82Kb
«Viruses and the Law: Why the Law is Ineffective» by John Montana [Abstract] 14.18Kb
«Viruses Are Good for You» by Julian Dibbell [Abstract] 57.45Kb
«Viruses Are Not Speech» by Michel Kabay [Abstract] 3.1Kb
«Viruses of the Mind» by Richard Dawkins 50.01Kb
«Viruses Revealed: Understanding and Counter Malicious Software» by David Harley, Robert Slade, Urs Gattiker [Abstract] [SRC] 1.34Mb
«Viruses under LiNUX» [Abstract] [SRC] 70.97Kb
«Viruses using .NET Framework» by Zsombor Kurdi [Abstract] 13.06Kb
«Viruses: a concern for all of us» by Christophe Blaess [Abstract] 41.08Kb
«Viruses: That Intricate Yarn» by Roberta Buiani [Abstract] 35.78Kb
«VIRUSES: What they are, What they do, How they are written (The Virus Writer's Handbook: The Complete Guide)» by Terminator Z [Abstract] 94.43Kb
«Visualizing Windows Executable Viruses Using Self-Organizing Maps» by InSeon Yoo [Abstract] 27.89Kb
«VMware has you» by Z0mbie [Abstract] [SRC] 1.79Kb
«VX vs Commerce» by d3m, Ar3s [Abstract] 19.22Kb
«VX: What the Hell's happened?» by DecimatoR [Abstract] 6.91Kb
«The VxDCall backdoor» by GriYo [Abstract] 25.09Kb

W

«Warning: Virus!» by Dan Grabham [Abstract] 20.31Kb
«A Web of Detection» by Keith Jackson [Abstract] 13.58Kb
«The West German Hacker Incident and Other Intrusions» by Mel Mandell 13.93Kb
«What do you Feed a Trojan Horse?» by Cliff Stoll [Abstract] 30.19Kb
«What is Wild?» by Sarah Gordon [Abstract] 52.32Kb
«When Harlie Was One» by David Gerrold 497.59Kb
«When Java Was One: Threats From Hostile Byte Code» by Mark Ladue [Abstract] 30.23Kb
«When Worlds Collide: Information Sharing for the Security and Anti-virus Communities» by Sarah Gordon, Richard Ford [Abstract] 50.54Kb
«Where have the worms and viruses gone? - new trends in malware» by Eugene Schultz [Abstract] 30.94Kb
«Where the Coyotes Roamed: The Fall of the Scene» by Nemesis [Abstract] 3.24Kb
«Where There's Smoke, There's Mirrors: The Truth about Trojan Horses on the Internet» by David Chess, Sarah Gordon [Abstract] 80.65Kb
«Why a "good" virus is good idea» by VirusBuster [Abstract] 8.9Kb
«Why Computer Viruses Are Not And Never Were A Problem» by Sarah Gordon [Abstract] 33.98Kb
«Why I write viruses (and how not to stop me)» by MidNyte [Abstract] 5.18Kb
«Why Viruses Are and Always will be a Problem» by Richard Ford [Abstract] 12.19Kb
«Why Viruses are necessary» by J. S. Bach [Abstract] 3.7Kb
«Why writing viruses?» by n0ph [Abstract] 3.05Kb
«Wikipedia: Using free knowlegde for bad stuff» by SPTH [Abstract] [SRC] 11.25Kb
«Win2K infection» by GriYo [Abstract] 8.66Kb
«Win2k.SFPDisable» by Benny, Ratter [Abstract] [SRC] 8.43Kb
«Win32 Viral Networking Overwiew» by GriYo [Abstract] [SRC] 26Kb
«Win95 structures and secrets» by Murkry [Abstract] 9.73Kb
«Windows - where?» by Lord Julus [Abstract] 5.85Kb
«Windows 95 and Viruses» by Alan Solomon [Abstract] 3.31Kb
«With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988» by Mark Eichin, Jon Rochlis [Abstract] 139.28Kb
«With war near, U.S. raises terror alert level» by Dan Verton [Abstract] 3.34Kb
«Wordmacro Viruses» by b0z0 16.54Kb
«The worm has turned» by Sarah Gordon [Abstract] 14.96Kb
«The worm that turned: A social use of computer viruses» by Ian Witten, Harold Thimbleby [Abstract] 29.76Kb
«Worm wars» by Peter Ferrie, Frédéric Perriot, Péter Ször [Abstract] 15.57Kb
«Worm: The First Digital World War» by Mark Bowden [Abstract] 404.25Kb
«The wormpipe strikes back» by Peter Ferrie, Frédéric Perriot [Abstract] 19.09Kb
«Worms» by Alan Solomon [Abstract] 1.9Kb
«Worms and Viruses: A little essay» by SnakeByte [Abstract] 4.37Kb
«A Worst-Case Worm» by Nicholas Weaver, Vern Paxson [Abstract] [TeX] 46.24Kb
«Writing disassembler» by mdew [Abstract] [SRC] 19.71Kb
«Writing ELF parasitic Code in C» by BrainStorm [Abstract] [SRC] 11.73Kb
«Writing into kernel from ring-3: Lets fuck pagetable» by Z0mbie [Abstract] [SRC] 15.04Kb
«Writing irc worms for xchat2» by WarGame [SRC] 4.92Kb

X

«X-Rays Can Be Bad For Your Virus's Health» by The Sorcerer [Abstract] 7.11Kb

Y

«You Must Be Punished» by Philip Elmer-DeWitt, Ross Munro [Abstract] 3.67Kb
«You've got M(1**)a(D)i(L+K)l» by Peter Ferrie [Abstract] 10.38Kb
«You, Too, Can Write an Anna Worm» by Michelle Delio [Abstract] 6.96Kb
«Your favorites, my victims - .url infection in JavaScript» by DiA [Abstract] [SRC] 7.9Kb

Z

«Zmist Opportunities» by Peter Ferrie, Péter Ször [Abstract] 11.45Kb
By accessing, viewing, downloading or otherwise using this content you agree to be bound by the Terms of Use! vxer.org aka vx.netlux.org
deenesitfrplruua