Построение эффективных методов криптографической защиты программ от компьютерных вирусов
Диссертация
Предложена математическая модель для оценки угрозы эпидемии компьютерных вирусов, использующих технологию заражения заранее составленного списка уязвимой популяции, позволяющая оценить время заражения уязвимой популяции из N узлов как число дискретных шагов Л (к, N) заражения дерева степени К. Предложенные математические модели и полученные аналитические результаты эволюции эпидемии позволяют… Читать ещё >
Список литературы
- Menezes A., van Oorschot V., and Vanstone S. Handbook of Applied Cryptography//CRC Press, Inc. — 1997
- Шнайер Б. Прикладная криптография. Второе издание // Издательство ТРИУМФ — Москва — 2002
- Stallings, W. Cryptography and Network Security: Principles and Practice. Second Edition // New Jersey: Prentice Hall — 1999
- Hellman M. Software Distribution System // US Patent № 4,658,093 — Apr. 14, 1987
- Atallah M. J., Bryant E. D., and Stytz M. R. A Survey of Anti-Tamper Technologies // The Journal of Defense Software Engineering — 2004
- Aucsmith D. Tamper Resistant Software: An Implementation // In: Proceedings of the First International Information hiding Workshop. — IHW'96, Vol. 1174, 1997, pp. 317−333
- Devanbu P. Т., Fong P. W.-L., Stubblebine S. G. Techniques for Trusted Software Engineering// In: Proceedings of the 20th International Conference on Software Engineering— Kyoto, Japan, 1998, pp. 126−135
- Microsoft Corporation Using Catalog files// SDK Documentation Tutorial — http://msdn.microsoft.com/library/default.asp?url=/workshop/ delivery/download/overview/catalog.asp
- ГОСТ 34.10−94/2001 // Информационная технология. Криптографическая защита информации. Процессы формирования и проверки электронной цифровой подписи.
- Булыгин Ю. С., Ефремов А. А. Об особенностях хранения электронной подписи в программных продуктах // Информационные процессы (ИП-ПИ РАН) 2005 — Том 5, № 5, стр. 443−447 — http: //www. j ip. т/2005/ 443−447.pdf
- Булыгин Ю. С. Аспекты лицензирования: структура и защита лицензионных данных // Проблемы информационной безопасности. Компьютерные системы 2005 — № 1, стр. 23−28
- Jakobsson М., and Reiter М. К. Discouraging Software Piracy Using Software Aging// DRM 2001 — Springer-Verlag Berlin Heidelberg, LNCS 2320, pp. 1−12,
- Rivest, R. The MD5 Message Digest Algorithm//RFC 1321. MIT LCS and RSA Data Security — April 1992
- Ellison, C., and Schneier, B. Ten Risks of PKI: What You’re not Being Told about Public Key Infrastructure // Computer Security Journal, vol. XVI, no. 1, pp. 1−8 — 2000
- Rivest, R., Shamir, A., and Adleman, L. A method for Obtaining Digital Signatures and Public Key Cryptosystems // Communications of the ACM, vol. 21, no. 2, pp. 120−126 — February 1978
- ITU-T Recommendation X.509 Information Technology Open Systems Interconnection — The Directory: Authentication Framework // ISO/lEC 9594−8, 1993 Edition
- Шнайер Б. Хаанский бальзам // пер. Асанов С. — http://www. cryptopro.ru/CryptoPro/documentation/hanaanbalz.htm
- Bulygin, Yu. Protecting public keys from forgery via «unkeyed» commutative encryption // In: Proceedings of the 8th International Symposium on Communication Theory and Applications — Ambleside, UK, 2005, pp. 83−86
- Massey J. L., and Omura J. K. Method and apparatus for maintaining the privacy of digital messages conveyed by public transmission // U.S. Patent № 4,567,600 —Jan. 28, 1986
- Massey J. L. Contemporary Cryptology: An Introduction // In: Contemporary Cryptology: The Science of Information Integrity, G.J. Simmons, ed., IEEE Press — 1992, pp. 1−39
- Hamblin J. Elliptic Curve Ciyptography// 1999
- Wagner L. Algebro-Geometric Attack Methods in Elliptic Curve Cryptography// Honours Thesis, Department of Mathematics The University of Queensland — 2002
- Zimmermann P. An Introduction to Cryptography // Network Associates, Inc. — 1990−1998
- Entrust Technologies Limited. Trusted Public-Key Infrastructures // August 2000
- Lee В., and Kim K. Software Protection Using Public Key Infrastructure // In: Proceedings of the 1999 Symposium on Cryptography and Computer Security — SCIS'99, Kobe, Japan — January 1999
- Вентцель Е. С., Овчаров Л. А. Теория стохастических процессов и их инженерные приложения // 3-е изд. перераб. и доп. — Издательский дом «Академия» — Москва — 200 331. Murray J. D. Mathematical Biology: I. An Introduction // Springer-Verlag — 2003
- Kermack W. O., and McKendrick A. J. A Contribution to the Mathematical Theoiy of Epidemics // Proc. Roy. Soc. Lond. A 115, pp. 700−721 — May 13, 1927
- Anderson, R. M. and May, R. M. Population Biology of Infectious Diseases: Part I. // Nature 280, pp. 361 -367 — 1979
- Anderson, R. M. and May, R. M. The Transmission Dynamics of Human Immunodeficiency Virus (HIV) // Philosophical Transactions of the Royal Society of London, В 321, No. 1207, pp. 565−607 — 1988
- Anderson, R. M. and Infection dynamics on scale-free networks // Phys. Rev. E. 64,66 112 — Nov. 19,2001
- Moreno Y., Pastor-Satorras R., and Vespignani A. Epidemic outbreaks in complex heterogeneous networks // preprint arXive: cond-mat/107 276 — Jul. 30, 2001
- Boguna M. and Pastor-Satorras R. Epidemic spreading in correlated complex networks // preprint arXive: cond-mat/205 621 — May 29,2002
- Boguna M., Pastor-Satorras R., and Vespignani A. Epidemic spreading in complex networks with degree correlations // preprint arXive: cond-mat/301 149 — Jan. 10, 2003
- Barthelemy M., Barrat A., Pastor-Satorras R., and Vespignani A. Velocity and hierarchical spread of epidemic outbreaks in scale-free networks // Phys. Rev. Lett. 92, No. 17 — Apr. 27,2004 — preprint arXive: cond-mat/311 501
- Pastor-Satorras RM and Vespignani A. Epidemic Spreading in Scale-Free Networks// Phys. Rev. Lett. 86, No. 14 — Apr. 2, 2001
- Pastor-Satorras R., and Vespignani A. Epidemic dynamics and endemic states in complex networks // Phys. Rev. E. 63, 66 117 — May 22, 2001
- Boguna M., Pastor-Satorras R., and Vespignani A. Absence of Epidemic Threshold in Scale-Free Networks with Degree Correlations // Phys. Rev. Lett. 90, No. 2 —Jan. 15, 2003
- Pastor-Satorras R., and Vespignani A. Immunization of complex networks // preprint arXiv: cond-mat/107 066 — Apr. 11, 2002
- Pastor-Satorras R., and Vespignani A. Epidemics and immunization in scale-free networks // WILEY-VCH Verlag Berlin GmbH — Sep. 13, 2005preprint arXiv: corid-mat/20 260
- Newman M. E. J. Properties of highly clustered networks // Phys. Rev. E. 68, 26 121 — Aug. 21, 2003 — preprint arXive: cond-mat/303 183
- Newman M. E. J., Forrest S., and Balthrop J. Email networks and the spread of computer viruses // Phys. Rev. E. 66, 35 101® — Sep. 10,2002
- Szendro В., and Csanyi G. Polynomial epidemics and clustering in contact networks // Bio. Lett. 04Ы0007, Proceedings of the Royal Society London В1. Feb. 20,2004
- Aiello О. E. and da Silva M. A. A. Dynamical Monte Carlo method for stochastic epidemic models//preprint arXive: cond-mat/208 089 — Jan. 13, 2003
- Joo J. Behavior of susceptible-infected-susceptible epidemics on heterogeneous networks with saturation // preprint arXive: cond-mat/402 065 — Apr. 24, 2004
- Joo J. Pair Approximation of the stochastic susceptible-infected-recovered-susceptible epidemic model on the hypercubic lattice // preprint arXive: q-bio.PE/404 035 — Apr. 26, 2004
- Vazquez A. Dergee correlations and clustering hierarchy in networks: measures, origin and consequences // Ph.D. Thesis, International School for Advanced Studies — Oct. 2002
- Vazquez A., and Barabasi A.-L. Non-Poisson Contact Processes in Virus Spreading // DIMACS Computational and Mathematical Epidemiology Seminar 2004 2005 — Jan. 2005 — http://dimacs.rutgers.edu/ SpecialYears/2002Epid/EpidSeminarSlides/vazquez.pdf
- Vazquez A., and Moreno Y. Resilience to damage of graphs with degree correlations // Phys. Rev. E. 67, 15 101 ® — Jan. 6,2003
- Dezso Z., and Barabasi A. Halting viruses in scale-free networks // preprint arXive: cond-mat/107 420 — Mar. 24, 2002
- Moreno Y., and Vazquez A. Disease Spreading in Structured Scale-Free Networks//preprint arXive: cond-mat/210 362 — Oct. 17, 2002
- Moreno Y., Gomez J. В., and Pacheco A. F. Epidemic Incidence in Correlated Complex Networks // Phys. Rev. E. 68, 35 103® — Sep. 19, 2003 — preprint arXive: cond-mat/309 462.
- Volz E. SIR dynamics in structured populations with heterogeneous connectivity // Journal of Mathematical Biology — Sep. 15, 2005 — preprint arXive: physics/508 160
- Zheng D., Hui P.M., Trimper S., and Zheng B. Epidemics and Dimensionality in Hierarchical Networks // preprint arXive: cond-mat/308 502 — Nov. 23,2004
- Liu J., Tang Y., and Yang Z. R. The spread of disease with birth and death on networks // preprint arXive: q-bio.PE/402 042 — Jun. 29, 2004
- Zanette D. H., and Kuperman M. Effects of immunization in small-world epidemics // preprint arXive: cond-mat/109 273 — Sep. 14, 2001
- Dammer S. M., and Hinrichsen H. Epidemic spreading with immunization and mutations // preprint arXive: cond-mat/303 467 — Mar. 21, 2003
- Hayashi Y., Minoura M., and Matsukubo J. Recoverable prevalence in growing scale-free networks and the effective immunization // preprint arXive: cond-mat/305 549 — Aug. 6, 2003
- Masuda N., and Konno N. Multi-state epidemic processes on complex networks // preprint arXive: cond-mat/504 329 — Apr. 13, 2005
- Ben-Nairn E., and Krapivsky P. L. Size of Outbreaks Near the Epidemic Threshold //preprint arXive: q-bio.PE/402 001 — Feb. 1, 2004
- Vojnovic M. and Ganesh A. On the Race of Worms, Alerts and Patches // Microsoft Research Limited — Technical Report MSR-TR-2005−13 — February 2005
- Bulygin, Yu. The Conqueror Worm: a hero of the play // Submitted to the 21st IFIP TC-11 International Information Security Conference (SEC 2006) Karlstad, Sweden, 2006
- Overton M. Bots and Botnets: Risks, Issues and Prevention // 15th International Virus Bulletin Conference 2005 — Dublin, Ireland — Sep. 2005 — http://arachnid.homeip.net/papers/VB2005-Botsand Botnets-1.0.2.pdf
- Kaspersky Lab The Changing Threat: From Pranksters to Professionals // Kaspersky Lab White Paper — 2005 — http://www.kasperskyusa.com/ promotions/wpindex.php
- Weaver N. Warhol Worms: The Potential for Very Fast Internet Plagues // http://www.cs.berkeley.edu/~nweaver/warhol.html
- Staniford S., Paxson V., and Weaver N. How to Own the Internet in Your Spare Time // 11th USENIX Security Symposium (Security'02) — San Francisco, С A — Aug. 2002 — pp. 149—167 — http://www.icir.org/ vern/papers/cdc-usenix-sec02/
- Staniford S., Paxson V., and Weaver N. Top Speed of Flash Worms // 2nd ACM Workshop on Rapid Malcode (WORM) — 2004 — http: //www. caida. org/outreach/papers/2004/topspeedworms/topspeed-worm04.pdf
- Shannon С., Moore D. The Spread of the Witty Worm // IEEE Security & Privacy — vol. 2, no. 4. — Jul./Aug. 2004 — http://www.caida.org/ outreach/papers/2004/witty/mal.xml
- Viruslist.com //http://www.viruslist.com/en/analysis
- Moore D., Paxson V., Savage S., Shannon C., Staniford S., and Weaver
- N. Inside the Slammer Worm // IEEE Security & Privacy — vol. 1, no. 4 — Jul./Aug. 2003 — http://www.computer.org/security/vln4/j4wea.htm
- Moore D., Paxson V., Savage S., Shannon C., Staniford S., and Weaver
- N. The Spread of the Sapphire/Slammer Worm // http://www.caida.org/ outreach/papers/2003/sapphire/sapphire.html
- Vogt T. Simulating and optimising worm propagation algorithms // Sep.2003 (Updated on Feb. 2004) — http://web.lemuria.org/security/ WormPropagation. pdf
- Bulygin, Yu. Catching viruses in CORBA // Submitted to the Black Hat Europe 2006 Briefings — Amsterdam, the Netherlands, 2006