Let’s call them… how two computer scientists made history

It is infectious and replicates.

That was the reasoning Professor Len Adleman did back in 1983, while studying the malicious program that his student at the time, Fred Cohen, had created as a university experiment. As he told us in a recent interview, he was studying actual HIV viruses in a molecular biology lab at the time, and soon it hit him: this program capable of quickly self-replicating in an infected system behaved like a regular virus.

We owe Professor Adleman for coining the term computer virus, and that is why we chose this cornerstone event from 1983 to declare Antimalware Day, an ESET initiative to reinforce the importance of protecting against threats in a world where computers can fit into our hands.

This is a date to honor the early work of Dr. Cohen and Prof. Adleman, and the foundations they laid for malware research and the development of computer defense techniques. Today we continue the celebration by showing exactly how these two scientists made history at a university lab.

Can you imagine how Dr. Cohen actually created the virus or how Prof. Adleman came up with its name? Take a look at this new infographic and find out:

Impressive, isn’t it?

The work of these men ended up inspiring a constant development of computer defense techniques, and constant research on computer threats. Prof. Adleman knew this was milestone for computer science history and he encouraged not only Dr. Cohen, but also his subsequent groups of students, to investigate the subject. Many of those early papers might have been the grounds for what later became the antivirus industry. Quite a legacy!

Some years after that, ESET also started looking for ways to develop successful countermeasures and continues to do so. In the meantime, many experts, researchers, analysts, educators and other specialists, joined this fascinating field and started working on research and awareness on computer threats.

Today, ESET is home of some of them who enjoy writing here at WeLiveSecurity to share their knowledge and expertise. David Harley is one of them: a Senior Research Fellow with many years of experience, he recalls the event in 1983. Harley says:

Cohen’s original – not to say seminal – dissertation on computer viruses is somewhat arcane. In fact, years ago when I used to talk to schools about security and malware in particular, I used to amuse myself by asking who was good at maths, then putting up a slide showing his formal definition of a virus from A Short Course On Computer Viruses and asking for help in understanding it. Fortunately, what he described as a ‘working definition’ is rather easier to understand, and indeed has been very commonly used out in the non-academic world:

“A virus is a program that can ‘infect’ other programs by modifying them to include a, possibly evolved, version of itself”.

In this and his subsequent writing, Cohen did a pretty good job of summarizing the broad spectrum of viral malware and antimalware technologies. True viruses nowadays constitute only a small proportion of malicious software (which is mostly distributed by other means such as malicious spam campaigns and drive-by downloads rather than self-replication), but his analyses of defensive techniques and technologies are still largely applicable, though mainstream anti-malware technology today uses a spread of technologies – what Cohen called the ‘synergistic effects of defense-in-depth’.

In A Short Course On Computer Viruses he wrote:

“Eventually, any defense can be defeated, but the use of defense-in-depth seems to provide far more effective protection than any other current alternatives because it covers each attack with multiple layers of defense”.

While companies like ESET have long agreed with and acted on this premise, antivirus still tended to be far more specialized in those days: indeed, at the time (1994) the first edition of that book was published, I was spending a lot of time supplementing the AV used where I worked by coding a range of MS-DOS utilities to plug some gaps in functionality…

As you can see, a lot has changed since the 80’s, but there is something that remains the same: the need for protecting every system as thoroughly as possible. Luckily we have multiple layers security solutions and well-known experts working around the world to study malware and come up with ways of protecting from it.

Do not miss the opportunity to join us celebrating the importance of antimalware protection on this Antimalware Day, to be held on November 3 every year from now on. Spread the word by joining the conversation on our social media channels by using the hashtag #AntimalwareDay.

Author , ESET

Follow us

Copyright © 2018 ESET, All Rights Reserved.