최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보과학회논문지. Journal of KIISE. 시스템 및 이론, v.29 no.4, 2002년, pp.220 - 231
조은선 (충북대학교 전기전자컴퓨터공학부) , 예홍진 (아주대학교 정보통신전문대학교) , 오세창 (아주대학교 정보통신전문대학교) , 홍선호 (아주대학교 정보통신전문대학교) , 홍만표 (아주대학교 정보통신전문대학교)
Trojan-horse programs are the programs that disguise normal and useful programs but do malicious thing to the hosts. This paper proposes an anti-Trojan horse mechanism using the information attached to the code by the developers. In this mechanism, each code is accompanied with the information on th...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
Symantec antiVirus for Macintosh-knowledge-base-About Trojan Horses, http://servicel.symantec.com/SUPPORT/num.nsf/d514450ab7fffddf852565a600636fb9/900ea4166e937d52852565a60063a176?OpenDocument
Virus Protection, http://helpdesk.uvic.ca/how-to/support/virus.html#winfeatures
R.W. Lo, K.N. Levitt, R.A. Olsson, 'MCF: a Malicious Code Filter,' Computers & Security, 1995, Vol.14, No.6, pp. 541-566
Trojan Port List, http://www.glocksoft.com/trojan_port.htm
F. Schneider, 'Enforceable Security Policies', Techbnical Report, TR98-1664, Dept of Computer Science, Cornell University, 1998
A. Acharya, M. Raje, 'MAPbox : Using Parameterized Behavior Classes to Confine Applications', Technical report TRCS99-15, Dept of Computer Science, University of Califormia, Santa Barbara
EROS: The Extremely Reliable Operating System, http://www.eros-os.org
S. Oaks, 'Java Security', O'Reilly, 1998
'Trojan Horses', http://www.ladysharrow.ndirect.co.uk/Maximum%20Security/trojans.htm
S. Mann, E. L. Michell, 'Linux System Securtiy : An Administrator's Guide to Open Source Security Tools', Prentice Hall RTR, 2000
'Navidad.exe', http://home.ahnlab.com/virus-info/navidad.html, 2000
H. Thimbleby, S. Anderson, P. Cairns, 'A framework for modeling Trojans and computer virus infection', Computer Journal, Vol. 41, No. 7, pp444-458, 1999
I. Goldberg, D. Wagner, R. Thomas, E. A. Brewer, 'A Secure Environment for Untrusted Helper Applications confining the Wily Hacker', Technical Report, University of California Berkeley, 1996
R. D. Nicola, G. Ferrari, R. Pugliese, 'Types as Specifications of Access Polices', Available at http://rap.dsi.unifi.it/papers/html. To appear in Theoretical Computer Science, http://www.cs.engruky.edu/~lewis/essays/compilers/Ⅱ-lang.html
Alfred V. Aho, Ravi Sethi, and Jeffrey D. Ullman, 'Compilers: Principles, Techniques and Tools', Addison-Wesley 1986
※ AI-Helper는 부적절한 답변을 할 수 있습니다.