Access the full text.
Sign up today, get DeepDyve free for 14 days.
M. Schuette, John Shen (1987)
Processor Control Flow Monitoring Using Signatured Instruction StreamsIEEE Transactions on Computers, C-36
G. Davida, Y. Desmedt, B. Matt (1989)
Defending systems against viruses through cryptographic authenticationProceedings. 1989 IEEE Symposium on Security and Privacy
Mark Joseph, A. Avizienis (1988)
A fault tolerance approach to computer virusesProceedings. 1988 IEEE Symposium on Security and Privacy
(1984)
Principes de Base de L'Auto-Detection D'Erreurs du SACEM/Monoprocesseur
Joseph M. K. (1988)
A Fault Tolerance Approach to Computer VirusesIEEE Symp. on Security and Privacy
Davida G. I. (1989)
312IEEE Symp. on Security and Privacy
Davida G. I. (1989)
Defending Systems Against Viruses through Cryptographic AuthenticationIEEE Symp. on Security and Privacy
Joseph M. K. (1988)
52IEEE Symp. on Security and Privacy
John Shen (1987)
A roving monitoring processor for detection of control flow errors in multiple processor systemsMicroprocessing and Microprogramming, 20
K. Wilken, John Shen (1991)
Concurrent Error Detection using Signature Monitoring and Encryption
A. Mahmood, E. McCluskey (1988)
Concurrent Error Detection Using Watchdog Processors - A SurveyIEEE Trans. Computers, 37
In their recent paper Davida, Desmedt, and Matt Davi89, p.313 state that there are many unanswered questions concerning the design of the virus detection scheme presented in Jose88. Included in their discussion are 3 specific criticisms of this virus detection scheme. However, 2 of these criticisms are completely unfounded, and can mislead the reader who is unfamiliar with the basic hardware design of the detection mechanism.
ACM SIGSAC Review – Association for Computing Machinery
Published: Oct 1, 1989
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.