{"title":"计算机病毒检测校验和算法的充分性","authors":"Douglas W. Varney","doi":"10.1145/99412.99494","DOIUrl":null,"url":null,"abstract":"1.0 Introduction Checksums, long used for random error detection in communications, is now being employed to detect changes for integrity purposes. For example, checksums are being used for the detection of computer viruses [FGZ86]. The checksum algorithms for detecting random errors are not sufficient against an entity that wishes to “fool” the checksum mechanism. This entity wants to be able to insert a forgery in place of the original data such that an unsuspecting user does not realize the forgery has occurred. This paper describes checksum algorithms and features of checksum algorithms to deter this type of forgery.","PeriodicalId":147067,"journal":{"name":"Symposium on Small Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1990-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Adequacy of checksum algorithms for computer virus detection\",\"authors\":\"Douglas W. Varney\",\"doi\":\"10.1145/99412.99494\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"1.0 Introduction Checksums, long used for random error detection in communications, is now being employed to detect changes for integrity purposes. For example, checksums are being used for the detection of computer viruses [FGZ86]. The checksum algorithms for detecting random errors are not sufficient against an entity that wishes to “fool” the checksum mechanism. This entity wants to be able to insert a forgery in place of the original data such that an unsuspecting user does not realize the forgery has occurred. This paper describes checksum algorithms and features of checksum algorithms to deter this type of forgery.\",\"PeriodicalId\":147067,\"journal\":{\"name\":\"Symposium on Small Systems\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1990-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Symposium on Small Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/99412.99494\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Symposium on Small Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/99412.99494","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Adequacy of checksum algorithms for computer virus detection
1.0 Introduction Checksums, long used for random error detection in communications, is now being employed to detect changes for integrity purposes. For example, checksums are being used for the detection of computer viruses [FGZ86]. The checksum algorithms for detecting random errors are not sufficient against an entity that wishes to “fool” the checksum mechanism. This entity wants to be able to insert a forgery in place of the original data such that an unsuspecting user does not realize the forgery has occurred. This paper describes checksum algorithms and features of checksum algorithms to deter this type of forgery.