Abstract :
Summarizes research on viruses and defenses. The author examines the state-of-the-art in virus defense today and describes how normal computing activities can proceed without undue risk of substantial viral harm. He then describes a set of redundant integrity protection mechanisms used in defending against computer viruses in untrusted computing environments. They include applications of coding theory, cryptography, operating system modifications, redundancy for detection and repair, fault avoidance, synergistic effects, and defense-in-depth
Keywords :
computer viruses; cryptography; data integrity; operating systems (computers); redundancy; best practice; coding theory; computer virus defence; computing activities; cryptography; fault avoidance; operating system modifications; redundant integrity protection mechanisms; risk; synergistic effects; untrusted computing environments; viral harm; virus detection; virus repair; Application software; Best practices; Codes; Computer viruses; Cryptography; Fault detection; Operating systems; Protection; Redundancy; Viruses (medical);