Computer viruses: theory and experiments
Computers and Security
A short course on computer viruses (2nd ed.)
A short course on computer viruses (2nd ed.)
The “worm” programs—early experience with a distributed computation
Communications of the ACM
The Giant Black Book of Computer Viruses
The Giant Black Book of Computer Viruses
IEEE Internet Computing
Predators: good will mobile codes combat against computer viruses
Proceedings of the 2002 workshop on New security paradigms
Defense and Detection Strategies against Internet Worms
Defense and Detection Strategies against Internet Worms
WORM vs. WORM: preliminary study of an active counter-attack mechanism
Proceedings of the 2004 ACM workshop on Rapid malcode
Using Predators to Combat Worms and Viruses: A Simulation-Based Study
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
Computer Viruses and Malware (Advances in Information Security)
Computer Viruses and Malware (Advances in Information Security)
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
ConceptDoppler: a weather tracker for internet censorship
Proceedings of the 14th ACM conference on Computer and communications security
Ethics and Information Technology
Ignoring the great firewall of china
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Hi-index | 0.00 |
The extent of Internet censorship in countries like China is regularly tested, but the testing methods used from within a censored country can entail risk for humans. A benevolent worm can be used for testing instead: the worm's self-replication, long the bane of suggested benevolent viruses and worms, is shown to be essential here. We describe the design of this benevolent worm, along with some other related applications for it. A technical, ethical, and legal analysis is provided.