VX Heaven

Library Collection Sources Engines Constructors Simulators Utilities Links Forum
Fred Cohen

Library: Fred Cohen

«A Case for Benevolent Viruses»[Abstract] 35.47Kb 13952 hits
«Computational Aspects of Computer Viruses»[Abstract] 13400 hits
«The Computer Security Encyclopedia. Computer Viruses.»[Abstract] 68.09Kb 17747 hits
«Computer Viruses - Theory and Experiments»[Abstract] 62.59Kb 41888 hits
«A Cost Analysis of Typical Computer Viruses and Defenses» [TeX][Abstract] 41.79Kb 8083 hits
«A Cryptographic Checksum for Integrity Protection»[Abstract] 22.24Kb 14564 hits
«Defense-In-Depth Against Computer Viruses» [TeX][Abstract] 69.27Kb 11227 hits
«Ethical Issues in Computer Virus Distribution»[Abstract] 5.17Kb 9529 hits
«A Formal Definition of Computer Worms and Some Related Results» [TeX][Abstract] 41.84Kb 18756 hits
«Models of Practical Defenses Against Computer Viruses»[Abstract] 39.65Kb 16350 hits
«A Note On High Integrity PC Bootstrapping»[Abstract] 15.62Kb 12690 hits
«On the Implications of Computer Viruses and Methods of Defense»[Abstract] 61.04Kb 18100 hits
«Reply to `Comment on "A Framework for Modelling Trojans and Computer Virus Infection"' by E. Mäkinen»[Abstract] 7.13Kb 10847 hits
«A Short Course on Computer Viruses» [TeX] [SRC][Abstract] 558.44Kb 19762 hits
«Trends In Computer Virus Research»[Abstract] 73.89Kb 16989 hits
«Virus Based Products»[Abstract] 2.58Kb 9827 hits

Fred Cohen is best known as the inventor of computer virus defense techniques, the principal investigator whose team defined the information assurance problem as it relates to critical infrastructure protection, as a seminal researcher in the use of deception for information protection, and as a top flight information protection consultant and industry analyst. But his work on information protection extends far beyond these areas.

In the 1970s he designed network protocols for secure digital networks carrying voice, video, and data; and he helped develop and prototype the electronic cashwatch for implementing personal digital money systems. In the 1980s, he developed integrity mechanisms for secure operating systems, consulted for many major corporations, taught short courses in information protection to over 10,000 students worldwide, and in 1989, he won the prestigious international Information Technology Award for his work on integrity protection. In the 1990s, he developed protection testing and audit techniques and systems, secure Internet servers and systems, defensive information warfare techniques and systems, early systems using deception for information protection, and bootable CDs designed for forensics and secure server applications. All told, the protection techniques he pioneered now help to defend more than three quarters of all the computers in the world.

Fred has authored almost 200 invited, refereed, and other scientific and management research articles, wrote a monthly column for Network Security magazine on managing network security for 6 years, and has written several widely read books on information protection.. His series of "Infosec Baseline" studies have been widely used by the research community as stepping off points for further research, his "50 Ways" series is very popular among practitioners looking for issues to be addressed, and his most recent "Protection for Deception" series of papers is widely cited. His most recent "Chief Information Security Officers ToolKit" series of books and booklets are used by leading security practitioners around the globe, while his "Frauds Spies and Lies and How to Defeat Them" book has been the subject of radio talk shows, and his "World War 3 ... Information Warfare Basics" is rapidly becoming standard among the thinkers in this arena.

As a corporate consultant and industry analyst Fred has helped advise hundreds of the world's largest companies on security and risk management strategy and their information protection programs. As a consultant to and researcher for the U.S. government he was the principal investigator on seminal studies in defensive information operations, he was the principal investigator on the national information security technical baseline series of reports, founded the College Cyber Defenders program at Sandia National Laboratories that ultimately led to the formation of the CyberCorps program, and led projects ranging from 'Resiliance' to 'The Invisible Router'. He has also worked in critical infrastructure protection, with law enforcement, and with the intelligence community to help improve their ability to deal with computer related crime and emerging threats to national security. He has worked on issues of digital forensics, including work for many large corporations, testimony in federal and state criminal and civil matters, and pro bono and state-funded work for indigent defendants, and in 2002, he won the "Techno-Security Industry Professional of the Year" Award.

Fred has participated in and created numerous strategic scenario games. He devised and ran the first Internet-based strategic information warfare wargame and held several initial trial Internet-based games involving national defense and corporate personnel. In 1998, he introduced the Internet Game for information security policy development, training, and awareness in corporate, educational, and government environments, and followed this up with the Sexual Harassment Game which helps train employees on sexual harassment policies and processes. His recent introduction of several security games and simulations to the Internet are excellent examples of the work he has done in this area. He has also developed several strategic scenarios for government and private use.

Over the past 30 years, Fred has managed organizations and projects with as many as 250 employees. Several projects he led have resulted in new business in excess of $10 million, and one project led to a 5-year government contract with a ceiling of over $1.7 billion. He led a 35-person research team at Sandia National Laboratories for almost 5 years and produced several patents, copyrighted software programs, and publications in the process.

His combination of management, technical, and communication skills, allows him to effectively bridge the gap between decision makers and implementers. His involvement in and understanding of corporate, national, and global issues, provides a context that allows him to meet challenges of unlimited size and scope. With almost 30 years of experience and a global reputation for integrity, accuracy, and innovation, Fred Cohen is widely considered one of the world's leading authorities in information protection.

By accessing, viewing, downloading or otherwise using this content you agree to be bound by the Terms of Use! aka