Knowledge

Fred Cohen

Source 📝

325: 126:’s class. He wrote a short program, as an experiment, that could "infect" computers, make copies of itself, and spread from one machine to another. It was hidden inside a larger, legitimate program, which was loaded into a computer on a 133:
One of the few solid theoretical results in the study of computer viruses is Cohen's 1987 demonstration that there is no algorithm that can perfectly detect all possible viruses.
386: 107:
defense techniques. He gave the definition of "computer virus". Cohen is best known for his pioneering work on computer viruses, the invention of
406: 362: 122:, he wrote a program for a parasitic application that seized control of computer operations, one of the first computer viruses, in 294: 381: 401: 115: 44: 24: 355: 195: 185: 180: 175: 170: 160: 151:
During the past 10 year of his research work, Fred Cohen wrote over 60 professional publications and 11 books.
119: 249: 348: 55: 209:
Cohen, F., 1987. "Computer Viruses Theory and Experiments," Computers and Security, vol. 6, pp. 22--35
50: 269: 108: 208: 391: 396: 324: 8: 100: 20: 331:
This biographical article relating to a computer specialist in the United States is a
141: 111:
mechanisms now in widespread use, and automation of protection management functions.
336: 298: 123: 165: 332: 104: 84: 66: 375: 127: 190: 145: 186:
1988, On the Implications of Computer Viruses and Methods of Defense
176:
1992, A Formal Definition of Computer Worms and Some Related Results
236: 148:
files on a computer, not to destroy, but to make them smaller.
196:
1989, Models of Practical Defenses Against Computer Viruses
181:
1989, Models of Practical Defenses Against Computer Viruses
171:
1991, The Computer Security Encyclopedia - Computer Viruses
373: 270:An Undetectable Computer Virus (academic paper) 191:1984, Computer Viruses - Theory and Experiments 356: 250:"Computer Viruses - Theory and Experiments" 363: 349: 387:USC Viterbi School of Engineering alumni 161:1991, Trends In Computer Virus Research 374: 247: 319: 282:Computer Viruses and Data Protection 166:1991, A Case for Benevolent Viruses 13: 407:American computer specialist stubs 140:and he had created one called the 103:and best known as the inventor of 14: 418: 144:which spreading would infect all 116:University of Southern California 45:University of Southern California 323: 114:In 1983, while a student at the 25:Frederick Cohen (disambiguation) 109:high integrity operating system 287: 274: 263: 241: 230: 218: 136:Cohen also believed there are 1: 201: 382:American computer scientists 335:. You can help Knowledge by 7: 402:Computer security academics 99:(born 1956) is an American 19:For the mathematician, see 16:American computer scientist 10: 423: 318: 56:Carnegie-Mellon University 18: 154: 90: 80: 73: 62: 39: 32: 51:University of Pittsburgh 23:. For other people, see 295:"Interview Fred Cohen" 280:Burger, Ralph, 1991. 120:School of Engineering 248:Cohen, Fred (1984). 101:computer scientist 97:Frederick B. Cohen 34:Frederick B. Cohen 21:Frederick R. Cohen 344: 343: 237:A short biography 142:compression virus 94: 93: 85:Computer virology 75:Scientific career 414: 365: 358: 351: 327: 320: 310: 309: 307: 306: 297:. Archived from 291: 285: 278: 272: 267: 261: 260: 258: 256: 245: 239: 234: 228: 222: 138:positive viruses 58:B.S.E.E., 1977) 47: 30: 29: 422: 421: 417: 416: 415: 413: 412: 411: 372: 371: 370: 369: 316: 314: 313: 304: 302: 293: 292: 288: 279: 275: 268: 264: 254: 252: 246: 242: 235: 231: 223: 219: 214: 204: 157: 124:Leonard Adleman 54: 49: 43: 40:Alma mater 35: 28: 17: 12: 11: 5: 420: 410: 409: 404: 399: 394: 389: 384: 368: 367: 360: 353: 345: 342: 341: 328: 312: 311: 286: 273: 262: 240: 229: 216: 215: 213: 212: 205: 203: 200: 199: 198: 193: 188: 183: 178: 173: 168: 163: 156: 153: 105:computer virus 92: 91: 88: 87: 82: 78: 77: 71: 70: 67:Computer virus 64: 63:Known for 60: 59: 48:(Ph.D., 1986) 41: 37: 36: 33: 15: 9: 6: 4: 3: 2: 419: 408: 405: 403: 400: 398: 395: 393: 392:Living people 390: 388: 385: 383: 380: 379: 377: 366: 361: 359: 354: 352: 347: 346: 340: 338: 334: 329: 326: 322: 321: 317: 301:on 2014-01-13 300: 296: 290: 283: 277: 271: 266: 251: 244: 238: 233: 227: 221: 217: 210: 207: 206: 197: 194: 192: 189: 187: 184: 182: 179: 177: 174: 172: 169: 167: 164: 162: 159: 158: 152: 149: 147: 143: 139: 134: 131: 129: 125: 121: 117: 112: 110: 106: 102: 98: 89: 86: 83: 79: 76: 72: 68: 65: 61: 57: 52: 46: 42: 38: 31: 26: 22: 337:expanding it 330: 315: 303:. Retrieved 299:the original 289: 281: 276: 265: 253:. Retrieved 243: 232: 225: 220: 150: 137: 135: 132: 113: 96: 95: 74: 53:(M.S., 1980) 397:1956 births 284:, pp. 19-20 255:January 13, 128:floppy disk 376:Categories 305:2014-01-13 224:Cf. CV at 202:References 146:executable 69:research 226:all.net 155:Papers 81:Fields 333:stub 257:2014 118:'s 378:: 130:. 364:e 357:t 350:v 339:. 308:. 259:. 211:. 27:.

Index

Frederick R. Cohen
Frederick Cohen (disambiguation)
University of Southern California
University of Pittsburgh
Carnegie-Mellon University
Computer virus
Computer virology
computer scientist
computer virus
high integrity operating system
University of Southern California
School of Engineering
Leonard Adleman
floppy disk
compression virus
executable
1991, Trends In Computer Virus Research
1991, A Case for Benevolent Viruses
1991, The Computer Security Encyclopedia - Computer Viruses
1992, A Formal Definition of Computer Worms and Some Related Results
1989, Models of Practical Defenses Against Computer Viruses
1988, On the Implications of Computer Viruses and Methods of Defense
1984, Computer Viruses - Theory and Experiments
1989, Models of Practical Defenses Against Computer Viruses
Cohen, F., 1987. "Computer Viruses Theory and Experiments," Computers and Security, vol. 6, pp. 22--35
A short biography
"Computer Viruses - Theory and Experiments"
An Undetectable Computer Virus (academic paper)
"Interview Fred Cohen"
the original

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.