SlideShare a Scribd company logo
1 of 4
Download to read offline
Computers & Security, 16 (1997) 412-415
A History Of Computer
Viruses - Introduction
Harold Joseph Highland FICS, FACM
Editor-in-Chief Emeritus
The following series of articles are taken from Harold’s Computer
Virus Handbook, published by Elsevier Advanced Technology in
1990. Viruses have moved on a long way since then, but the
extracts published here provide a useful background in virus
development, and contain much information that is still relevant
today. It is also interesting to note that Harold introduces the
Macro Virus concept a few years before it became more widely
identified as a major problem.
In this section we shall present detailed information
about a number of computer viruses, specifically when
and where the virus was found, how it behaved and a
technical report on how it works as well as other rel-
ative information. We had hoped to present these data
in historical perspective. However, it is too early to
prepare a comprehensive history of computer viruses.
This volume is about DOS computer viruses, that is
computer viruses that have been found in systems using
either IBM-DOS or MS-DOS. No attempt has been
made to cover the many other viruses that have surfaced
to infect Macintosh microcomputers. Nor are any of
the VAX viruses included. Furthermore, although we
0 Compulit, Inc., lY89. AU rights reterved
shall include detailed data about a number of viruses,
we are not willing to ‘put into print’ some of the
material and purported research reports currently
available. So that the reader is better able to understand
our viewpoint, we shall elaborate on some of the
problems prior to the detailed reports about specific
viruses.
A Matter of Definition
First, there is the question of a definition of a comput-
er virus. There is currently no agreement in the com-
puter community.To the general reader differences may
appear slight but to the technician they are major.
There are many who consider computer viruses as
the offspring of Dr. Frederick B. Cohen. He created
a virus, as part of his doctoral thesis, in an effort to
find ways to defend computer systems from
self-replicating programsThere are others who claim
that computer viruses existed well before 1984 when
Dr. Cohen did his research. The debate about the
appearance of the first virus will probably continue
far into the future. Currently it does not appear like-
ly that computer scientists will agree upon an ‘offi-
cial’ definition of the term.
412 3160167-4048/97$17.00 0 1997 Elsevier Science Ltd
Computers and Security, Vol. 16, No. 5
Dr. Cohen first made his research public at the 1984
National Computer Security Conference. He made his
findings known to an international audience during his
presentation that same year at the International
Federation for Information Processing Computer
Security Conference in Toronto, Canada, IFIP/Sec ‘84.
That conference was sponsored by IFIP Technical
Committee 11 responsible for information processing
security. It was attended by several hundred computer
security specialists from all over the world. We often
tell our lecture audiences about the reaction to his
presentation at that meeting.
Later in the day, after Dr. Cohen presented his paper,
we met with several computer security directors from
Europe and Asia. Most of them felt that Dr. Cohen’s
report was interesting but esoteric. One security direc-
tor from a major multinational corporation remarked
that it was most interesting to him that an American
university would provide a young man with a labora-
tory “to play games.” He could see no “practical”
application of the research and felt that it too would
disappear among the many “useless, academic studies.”
Dr. Cohen’s reports, made in the United States and
Canada, received little, if any, coverage in the European
press. It was not until a presentation by Rudiger
Dierstein of the Deutsche Forschungs und
Versuchsanstalt fur Luft - und Raumfahrt [DFVLRl at
SECURICOM in Paris the next year that the European
press began to report about computer viruses.
Is It Really a virus?
We have followed a conservative approach to the
acceptance of computer virus claims. Unless we have
been able to obtain a copy of the virus, disassemble it
[l] DMA is direct memory access, a techmque that allows peripheral
devices to gain direct access to the microcomputer’s main memory. This
causes the processor to stop all activity along a bus, a communications line
along which the data are transmmed - HJH
[2] CRC is cyclic redundancy check a method used for detectmg errors in
the transfer of data - HJH
and see it in action, we have steadfastly refused to
accept unsupported claims made by others.
For example, early in 1988 one of the anti-virus prod-
uct producers reported that he had found a new com-
puter virus that “destroyed” the hard disk. To obtain
additional information I spoke a few weeks later with
the individual who had reported the ‘virus’ to him.
The ‘virus’ had appeared several months earlier on her
system. What she found was that when backing up a
file to a floppy disk using the DOS COPY command
or even using her text editor, the backup copy was
sometimes incomplete - part of the copy just van-
ished. Having read about the producer’s appeal to
report computer viruses, she telephoned him. At his
request she sent him a copy of her hard disk.
During our conversation she admitted that she had
not reformatted her disk and reloaded it with clean
programs. Almost five months after the press ran the
producer’s report she was still operating as before. She
still encountered the difficulty at infrequent intervals.
Because the ‘virus’ was found only at one site and not
reported elsewhere, we filed that report for future
consideration.
Because we were busy with other viruses, we did not
find time to follow up that story for many months.
However, on November 14,1988, Dr. I? M. Adams of
the Computer Science Department of Nova
University [Florida] issued a research report,
“Hardware-Induced Data Virus: Floppy Diskette
Controller Design Flaw.” In it he explained that there
was a basic flaw in INTEL’s chip 8272A that had been
used on the floppy disk controller board in roughly 25
million microcomputers. According to Dr. Adams,
INTEL had sent a release on May 2, 1988 to its cus-
tomers stating:
“It has been found that the 8272A cannot
detect a DMA underrun on the last byte of a
write operation to a sector. If the 8272A is pre-
empted during a DMA [l] transfer, and an
overrun occurs on the last byte of a sector, the
following occurs: the underrun flag does not
get set, the last byte written to the disk is made
equal to the previous byte written and CRC 121
413
H.J. Highland/A History Of Computer Viruses - Introduction
is generated on the ALTERED data.The result
is that INCORRECT DATA is WRITTEN to
the disk andVALIDATED by the 8272A.”
Although we do not agree with Dr. Adams’s use of the
term, “hardware-induced data virus,” it appears likely
that the earlier reported ‘virus’ may well have been a
hardware defect. In any event the so-called virus had
not destroyed her hard disk.
The Numbers Game
An oft-repeated question by the press during an inter-
view with anyone working with computer viruses is
“How many computer viruses are there?” An answer
that we are not certain but we have 15 in our labora-
tory, sends the interviewer off to find a ‘better’ source.
There appears to be a competition among some
working in the computer virus field to announce a
greater number than anyone else. One researcher who
distributes his findings on a bulletin board announced
that he had collected and examined 48 computer
viruses. Another whom we heard at a conference in
the late spring of 1989 told the audience that he had
already collected more than 160. It appears that the
more computer viruses one can list, the greater an
authority he is on the subject.
There are viruses and there are often mutations of
these viruses. For example, one attribute of the Brain
virus is to write “Brain” as the label on an infected
disk. If another virus is found that writes “HA-HA” as
the disk label but is identical in every other respect,
does one count this as “a new” virus? The code of
both are the same but only five ASCII characters have
been changed.
We deal with these mutations in a simple way. So long
as critical code in the virus has not been altered, we
call the other virus a variant or mutant. On the other
hand, many researchers have taken an easier way out.
If there is any change, no matter how slight, they
count the other as a new virus. The policy we have
followed thus far leads to some problems.
For example, a virus that will attack all .COM pro-
grams except COMMAND.COM appears in an
altered form so that even COMMAND.COM is
attacked. Although the modification of the code of
that virus is no more difficult than the change of the
label name, this altered form is different. The action
of the virus has been modified.
Similarly if a virus that attacks only 5 l/4-inch flop-
py disks appears so that it is capable of attacking a
hard disk drive, do we consider it to be a new virus?
We feel that so long as any two viruses have identical
code and do not behave differently, they are variants of
the original virus. However, if their actions have been
modified they should be classed as a new form of the
original virus. We are not interested in amassing num-
bers. However we feel that a logical, scientific
approach to virus taxonomy is needed.
Virus Identification
Each time a virus appears in a new location, the find-
er often believes he has a new virus. When we received
a virus from an associate in the Middle East we accept-
ed the name as the Ping-Pong virus. Our first reports
from England late in 1988 about that virus called it the
Italian virus. Later some researchers there renamed it
as the “1803” virus. Since then we have seen it called
the Bouncing Ball virus and the Turin virus.
The virus specialist, who does not have a copy of this
virus and/or is unable to confirm that the versions are
identical, is too often misled. He is likely to consider
counting each as a separate virus. Even if he goes
through the many reports from the different centres
he might not be fully informed.
Most serious researchers have called for a protocol
whereby specialists in different parts of the worId can
compare the viruses they have without the need to send
the actual virus and/or its disassembled code. Most are
reluctant to send either for fear of spreading the virus.
Making source code or a copy of a disk with a virus
available is dangerous. It takes little effort on the part of
a skilled programmer to modify the trigger and/or
414
Computers and Security, Vol. 16, No. 5
action portions of a virus once one has a workable copy
There have been calls by researchers to establish a cen-
tral clearing house for computer viruses. In most cases
the researcher feels that his site should serve as that
center. We have long felt that there is need for a
method by which researchers can exchange informa-
tion without sending the actual virus and/or the dis-
assembled code. Charles M. Preston, a computer secu-
rity specialist and virus researcher in Anchorage
[Alaska] and we have discussed the need for creating a
computer virus directory. That directory would pro-
vide specific information about each virus; among
some of the data would be:
l its size in number of bytes,
l the medium which it attacks,
l a hexadecimal or ASCII checksum of its actual code,
l the signature, if any, that the virus uses to avoid rein-
fection,
l a listing ofASCl1 strings in the viral code and their
location, and
l detailed information about the replication proce-
dure, the trigger mechanism, and action taken.
Source of Virus Data
have included virus analysis in the following few sec-
tions based on the following sources:
[l] Computer viruses we have in our laboratory.
These viruses have been received f?om sites that
have been attacked as well as from associates in dif-
ferent parts of the world. In addition to our own
analysis we have supporting information from Bill
Kenny, a highly-skilled programmer and analyst
with Digital Dispatch Inc. of St. Paul [Minnesota]
and Dr. Jon David of Systems Research and
Development of Tappan [New York]. We should
also acknowledge the assistance from several com-
puter security specialists in different parts of the
world, ranging from Australia to the United
Kingdom to Finland and Sweden.
[2] Substantiated reports from reliable researchers.
Although we have a number of computer virus-
es and mutations, we do not physically have
copies of all the viruses that have been found in
the world. Many researcher reports cannot be
confirmed and others have analyses of viruses
that do not conform with our findings; these
were not used.
[3] Finally we should note that the material presented
in the section of laboratory viruses has come from
sources that cannot be publicly identified. In each
case, however, we have thoroughly examined the
data and investigated the integrity of the source.
In line with the conservative policy we have followed
since the computer virus explosion in late 1987 we
415

More Related Content

What's hot

Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer supportbozzerapide
 
A history of computer viruses three special viruses
A history of computer viruses   three special virusesA history of computer viruses   three special viruses
A history of computer viruses three special virusesUltraUploader
 
Computer Viruses- B S Kalyan Chakravarthy
Computer Viruses- B S Kalyan ChakravarthyComputer Viruses- B S Kalyan Chakravarthy
Computer Viruses- B S Kalyan ChakravarthyDipayan Sarkar
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threatSadaf Walliyani
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & preventionKhaleel Assadi
 
Search Diverse Models for Proactive Software Diversification
Search Diverse Models for Proactive Software DiversificationSearch Diverse Models for Proactive Software Diversification
Search Diverse Models for Proactive Software DiversificationFoCAS Initiative
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacyJoy Chakraborty
 
Virus detection based on virus throttle technology
Virus detection based on virus throttle technologyVirus detection based on virus throttle technology
Virus detection based on virus throttle technologyAhmed Muzammil
 

What's hot (10)

Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer support
 
A history of computer viruses three special viruses
A history of computer viruses   three special virusesA history of computer viruses   three special viruses
A history of computer viruses three special viruses
 
Viruses
VirusesViruses
Viruses
 
Computer Viruses- B S Kalyan Chakravarthy
Computer Viruses- B S Kalyan ChakravarthyComputer Viruses- B S Kalyan Chakravarthy
Computer Viruses- B S Kalyan Chakravarthy
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Search Diverse Models for Proactive Software Diversification
Search Diverse Models for Proactive Software DiversificationSearch Diverse Models for Proactive Software Diversification
Search Diverse Models for Proactive Software Diversification
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
Virus
VirusVirus
Virus
 
Virus detection based on virus throttle technology
Virus detection based on virus throttle technologyVirus detection based on virus throttle technology
Virus detection based on virus throttle technology
 

Similar to A history of computer viruses introduction

Similar to A history of computer viruses introduction (20)

A Computer Virus Primer
A Computer Virus PrimerA Computer Virus Primer
A Computer Virus Primer
 
Computer viruses. - Free Online Library
Computer viruses. - Free Online LibraryComputer viruses. - Free Online Library
Computer viruses. - Free Online Library
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
εργασια
εργασιαεργασια
εργασια
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Viruses
VirusesViruses
Viruses
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Anti virus
Anti virusAnti virus
Anti virus
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
 
Final Project _Smart Utilities
Final Project _Smart UtilitiesFinal Project _Smart Utilities
Final Project _Smart Utilities
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 

More from UltraUploader

01 le 10 regole dell'hacking
01   le 10 regole dell'hacking01   le 10 regole dell'hacking
01 le 10 regole dell'hackingUltraUploader
 
00 the big guide sz (by dr.to-d)
00   the big guide sz (by dr.to-d)00   the big guide sz (by dr.to-d)
00 the big guide sz (by dr.to-d)UltraUploader
 
[E book ita] php manual
[E book   ita] php manual[E book   ita] php manual
[E book ita] php manualUltraUploader
 
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...UltraUploader
 
[Ebook ita - database] access 2000 manuale
[Ebook   ita - database] access 2000 manuale[Ebook   ita - database] access 2000 manuale
[Ebook ita - database] access 2000 manualeUltraUploader
 
(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)UltraUploader
 
(Ebook ita - inform - access) guida al database access (doc)
(Ebook   ita - inform - access) guida al database access (doc)(Ebook   ita - inform - access) guida al database access (doc)
(Ebook ita - inform - access) guida al database access (doc)UltraUploader
 
(Ebook computer - ita - pdf) fondamenti di informatica - teoria
(Ebook   computer - ita - pdf) fondamenti di informatica - teoria(Ebook   computer - ita - pdf) fondamenti di informatica - teoria
(Ebook computer - ita - pdf) fondamenti di informatica - teoriaUltraUploader
 
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorUltraUploader
 
Botnetsand applications
Botnetsand applicationsBotnetsand applications
Botnetsand applicationsUltraUploader
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worriesUltraUploader
 
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...UltraUploader
 
Bird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassemblyBird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassemblyUltraUploader
 
Biological versus computer viruses
Biological versus computer virusesBiological versus computer viruses
Biological versus computer virusesUltraUploader
 
Biological aspects of computer virology
Biological aspects of computer virologyBiological aspects of computer virology
Biological aspects of computer virologyUltraUploader
 
Biological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksBiological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksUltraUploader
 
Binary obfuscation using signals
Binary obfuscation using signalsBinary obfuscation using signals
Binary obfuscation using signalsUltraUploader
 

More from UltraUploader (20)

1 (1)
1 (1)1 (1)
1 (1)
 
01 intro
01 intro01 intro
01 intro
 
01 le 10 regole dell'hacking
01   le 10 regole dell'hacking01   le 10 regole dell'hacking
01 le 10 regole dell'hacking
 
00 the big guide sz (by dr.to-d)
00   the big guide sz (by dr.to-d)00   the big guide sz (by dr.to-d)
00 the big guide sz (by dr.to-d)
 
[E book ita] php manual
[E book   ita] php manual[E book   ita] php manual
[E book ita] php manual
 
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
 
[Ebook ita - database] access 2000 manuale
[Ebook   ita - database] access 2000 manuale[Ebook   ita - database] access 2000 manuale
[Ebook ita - database] access 2000 manuale
 
(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)
 
(Ebook ita - inform - access) guida al database access (doc)
(Ebook   ita - inform - access) guida al database access (doc)(Ebook   ita - inform - access) guida al database access (doc)
(Ebook ita - inform - access) guida al database access (doc)
 
(Ebook computer - ita - pdf) fondamenti di informatica - teoria
(Ebook   computer - ita - pdf) fondamenti di informatica - teoria(Ebook   computer - ita - pdf) fondamenti di informatica - teoria
(Ebook computer - ita - pdf) fondamenti di informatica - teoria
 
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitor
 
Botnetsand applications
Botnetsand applicationsBotnetsand applications
Botnetsand applications
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worries
 
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
 
Blast off!
Blast off!Blast off!
Blast off!
 
Bird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassemblyBird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassembly
 
Biological versus computer viruses
Biological versus computer virusesBiological versus computer viruses
Biological versus computer viruses
 
Biological aspects of computer virology
Biological aspects of computer virologyBiological aspects of computer virology
Biological aspects of computer virology
 
Biological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksBiological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networks
 
Binary obfuscation using signals
Binary obfuscation using signalsBinary obfuscation using signals
Binary obfuscation using signals
 

A history of computer viruses introduction

  • 1. Computers & Security, 16 (1997) 412-415 A History Of Computer Viruses - Introduction Harold Joseph Highland FICS, FACM Editor-in-Chief Emeritus The following series of articles are taken from Harold’s Computer Virus Handbook, published by Elsevier Advanced Technology in 1990. Viruses have moved on a long way since then, but the extracts published here provide a useful background in virus development, and contain much information that is still relevant today. It is also interesting to note that Harold introduces the Macro Virus concept a few years before it became more widely identified as a major problem. In this section we shall present detailed information about a number of computer viruses, specifically when and where the virus was found, how it behaved and a technical report on how it works as well as other rel- ative information. We had hoped to present these data in historical perspective. However, it is too early to prepare a comprehensive history of computer viruses. This volume is about DOS computer viruses, that is computer viruses that have been found in systems using either IBM-DOS or MS-DOS. No attempt has been made to cover the many other viruses that have surfaced to infect Macintosh microcomputers. Nor are any of the VAX viruses included. Furthermore, although we 0 Compulit, Inc., lY89. AU rights reterved shall include detailed data about a number of viruses, we are not willing to ‘put into print’ some of the material and purported research reports currently available. So that the reader is better able to understand our viewpoint, we shall elaborate on some of the problems prior to the detailed reports about specific viruses. A Matter of Definition First, there is the question of a definition of a comput- er virus. There is currently no agreement in the com- puter community.To the general reader differences may appear slight but to the technician they are major. There are many who consider computer viruses as the offspring of Dr. Frederick B. Cohen. He created a virus, as part of his doctoral thesis, in an effort to find ways to defend computer systems from self-replicating programsThere are others who claim that computer viruses existed well before 1984 when Dr. Cohen did his research. The debate about the appearance of the first virus will probably continue far into the future. Currently it does not appear like- ly that computer scientists will agree upon an ‘offi- cial’ definition of the term. 412 3160167-4048/97$17.00 0 1997 Elsevier Science Ltd
  • 2. Computers and Security, Vol. 16, No. 5 Dr. Cohen first made his research public at the 1984 National Computer Security Conference. He made his findings known to an international audience during his presentation that same year at the International Federation for Information Processing Computer Security Conference in Toronto, Canada, IFIP/Sec ‘84. That conference was sponsored by IFIP Technical Committee 11 responsible for information processing security. It was attended by several hundred computer security specialists from all over the world. We often tell our lecture audiences about the reaction to his presentation at that meeting. Later in the day, after Dr. Cohen presented his paper, we met with several computer security directors from Europe and Asia. Most of them felt that Dr. Cohen’s report was interesting but esoteric. One security direc- tor from a major multinational corporation remarked that it was most interesting to him that an American university would provide a young man with a labora- tory “to play games.” He could see no “practical” application of the research and felt that it too would disappear among the many “useless, academic studies.” Dr. Cohen’s reports, made in the United States and Canada, received little, if any, coverage in the European press. It was not until a presentation by Rudiger Dierstein of the Deutsche Forschungs und Versuchsanstalt fur Luft - und Raumfahrt [DFVLRl at SECURICOM in Paris the next year that the European press began to report about computer viruses. Is It Really a virus? We have followed a conservative approach to the acceptance of computer virus claims. Unless we have been able to obtain a copy of the virus, disassemble it [l] DMA is direct memory access, a techmque that allows peripheral devices to gain direct access to the microcomputer’s main memory. This causes the processor to stop all activity along a bus, a communications line along which the data are transmmed - HJH [2] CRC is cyclic redundancy check a method used for detectmg errors in the transfer of data - HJH and see it in action, we have steadfastly refused to accept unsupported claims made by others. For example, early in 1988 one of the anti-virus prod- uct producers reported that he had found a new com- puter virus that “destroyed” the hard disk. To obtain additional information I spoke a few weeks later with the individual who had reported the ‘virus’ to him. The ‘virus’ had appeared several months earlier on her system. What she found was that when backing up a file to a floppy disk using the DOS COPY command or even using her text editor, the backup copy was sometimes incomplete - part of the copy just van- ished. Having read about the producer’s appeal to report computer viruses, she telephoned him. At his request she sent him a copy of her hard disk. During our conversation she admitted that she had not reformatted her disk and reloaded it with clean programs. Almost five months after the press ran the producer’s report she was still operating as before. She still encountered the difficulty at infrequent intervals. Because the ‘virus’ was found only at one site and not reported elsewhere, we filed that report for future consideration. Because we were busy with other viruses, we did not find time to follow up that story for many months. However, on November 14,1988, Dr. I? M. Adams of the Computer Science Department of Nova University [Florida] issued a research report, “Hardware-Induced Data Virus: Floppy Diskette Controller Design Flaw.” In it he explained that there was a basic flaw in INTEL’s chip 8272A that had been used on the floppy disk controller board in roughly 25 million microcomputers. According to Dr. Adams, INTEL had sent a release on May 2, 1988 to its cus- tomers stating: “It has been found that the 8272A cannot detect a DMA underrun on the last byte of a write operation to a sector. If the 8272A is pre- empted during a DMA [l] transfer, and an overrun occurs on the last byte of a sector, the following occurs: the underrun flag does not get set, the last byte written to the disk is made equal to the previous byte written and CRC 121 413
  • 3. H.J. Highland/A History Of Computer Viruses - Introduction is generated on the ALTERED data.The result is that INCORRECT DATA is WRITTEN to the disk andVALIDATED by the 8272A.” Although we do not agree with Dr. Adams’s use of the term, “hardware-induced data virus,” it appears likely that the earlier reported ‘virus’ may well have been a hardware defect. In any event the so-called virus had not destroyed her hard disk. The Numbers Game An oft-repeated question by the press during an inter- view with anyone working with computer viruses is “How many computer viruses are there?” An answer that we are not certain but we have 15 in our labora- tory, sends the interviewer off to find a ‘better’ source. There appears to be a competition among some working in the computer virus field to announce a greater number than anyone else. One researcher who distributes his findings on a bulletin board announced that he had collected and examined 48 computer viruses. Another whom we heard at a conference in the late spring of 1989 told the audience that he had already collected more than 160. It appears that the more computer viruses one can list, the greater an authority he is on the subject. There are viruses and there are often mutations of these viruses. For example, one attribute of the Brain virus is to write “Brain” as the label on an infected disk. If another virus is found that writes “HA-HA” as the disk label but is identical in every other respect, does one count this as “a new” virus? The code of both are the same but only five ASCII characters have been changed. We deal with these mutations in a simple way. So long as critical code in the virus has not been altered, we call the other virus a variant or mutant. On the other hand, many researchers have taken an easier way out. If there is any change, no matter how slight, they count the other as a new virus. The policy we have followed thus far leads to some problems. For example, a virus that will attack all .COM pro- grams except COMMAND.COM appears in an altered form so that even COMMAND.COM is attacked. Although the modification of the code of that virus is no more difficult than the change of the label name, this altered form is different. The action of the virus has been modified. Similarly if a virus that attacks only 5 l/4-inch flop- py disks appears so that it is capable of attacking a hard disk drive, do we consider it to be a new virus? We feel that so long as any two viruses have identical code and do not behave differently, they are variants of the original virus. However, if their actions have been modified they should be classed as a new form of the original virus. We are not interested in amassing num- bers. However we feel that a logical, scientific approach to virus taxonomy is needed. Virus Identification Each time a virus appears in a new location, the find- er often believes he has a new virus. When we received a virus from an associate in the Middle East we accept- ed the name as the Ping-Pong virus. Our first reports from England late in 1988 about that virus called it the Italian virus. Later some researchers there renamed it as the “1803” virus. Since then we have seen it called the Bouncing Ball virus and the Turin virus. The virus specialist, who does not have a copy of this virus and/or is unable to confirm that the versions are identical, is too often misled. He is likely to consider counting each as a separate virus. Even if he goes through the many reports from the different centres he might not be fully informed. Most serious researchers have called for a protocol whereby specialists in different parts of the worId can compare the viruses they have without the need to send the actual virus and/or its disassembled code. Most are reluctant to send either for fear of spreading the virus. Making source code or a copy of a disk with a virus available is dangerous. It takes little effort on the part of a skilled programmer to modify the trigger and/or 414
  • 4. Computers and Security, Vol. 16, No. 5 action portions of a virus once one has a workable copy There have been calls by researchers to establish a cen- tral clearing house for computer viruses. In most cases the researcher feels that his site should serve as that center. We have long felt that there is need for a method by which researchers can exchange informa- tion without sending the actual virus and/or the dis- assembled code. Charles M. Preston, a computer secu- rity specialist and virus researcher in Anchorage [Alaska] and we have discussed the need for creating a computer virus directory. That directory would pro- vide specific information about each virus; among some of the data would be: l its size in number of bytes, l the medium which it attacks, l a hexadecimal or ASCII checksum of its actual code, l the signature, if any, that the virus uses to avoid rein- fection, l a listing ofASCl1 strings in the viral code and their location, and l detailed information about the replication proce- dure, the trigger mechanism, and action taken. Source of Virus Data have included virus analysis in the following few sec- tions based on the following sources: [l] Computer viruses we have in our laboratory. These viruses have been received f?om sites that have been attacked as well as from associates in dif- ferent parts of the world. In addition to our own analysis we have supporting information from Bill Kenny, a highly-skilled programmer and analyst with Digital Dispatch Inc. of St. Paul [Minnesota] and Dr. Jon David of Systems Research and Development of Tappan [New York]. We should also acknowledge the assistance from several com- puter security specialists in different parts of the world, ranging from Australia to the United Kingdom to Finland and Sweden. [2] Substantiated reports from reliable researchers. Although we have a number of computer virus- es and mutations, we do not physically have copies of all the viruses that have been found in the world. Many researcher reports cannot be confirmed and others have analyses of viruses that do not conform with our findings; these were not used. [3] Finally we should note that the material presented in the section of laboratory viruses has come from sources that cannot be publicly identified. In each case, however, we have thoroughly examined the data and investigated the integrity of the source. In line with the conservative policy we have followed since the computer virus explosion in late 1987 we 415