The internet worm program: an analysis
ACM SIGCOMM Computer Communication Review
Communications of the ACM
Communications of the ACM
Password security: a case history
Communications of the ACM
Lessons from the UNIX breakins at Stanford
ACM SIGSOFT Software Engineering Notes
An empirical study of the reliability of UNIX utilities
Communications of the ACM
Toward special-purpose program verification
Conference proceedings on Formal methods in software development
Computer
Hackers: computer heroes or electronic highwaymen?
ACM SIGCAS Computers and Society
Computer ethics—part of computer science!
ACM SIGCAS Computers and Society
Computational mail as network infrastructure for computer-supported cooperative work
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
FLIP: an internetwork protocol for supporting distributed systems
ACM Transactions on Computer Systems (TOCS)
Information systems security design methods: implications for information systems development
ACM Computing Surveys (CSUR)
Discovering shared interests using graph analysis
Communications of the ACM - Special issue on internetworking
A taxonomy of computer program security flaws
ACM Computing Surveys (CSUR)
Internet security: firewalls and beyond
Communications of the ACM
Property-based testing: a new approach to testing for assurance
ACM SIGSOFT Software Engineering Notes
An organizational approach to computer security
ACM SIGSAC Review
Remus: a security-enhanced operating system
ACM Transactions on Information and System Security (TISSEC)
Cleanness Checking of String Manipulations in C Programs via Integer Analysis
SAS '01 Proceedings of the 8th International Symposium on Static Analysis
Guarding the next Internet frontier: countering denial of information attacks
Proceedings of the 2002 workshop on New security paradigms
An evolutionary approach to synthetic biology: zen in the art of creating life
Advances in evolutionary computing
FDNA '03 Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture
Encyclopedia of Computer Science
SVGrid: a secure virtual environment for untrusted grid applications
MGC '05 Proceedings of the 3rd international workshop on Middleware for grid computing
Pass-thoughts: authenticating with our minds
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
Simulating non-scanning worms on peer-to-peer networks
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
On the performance of internet worm scanning strategies
Performance Evaluation
System and network trustworthiness in perspective
Proceedings of the 13th ACM conference on Computer and communications security
Password security: an empirical study
Journal of Management Information Systems
Performing real-time threat assessment of security incidents using data fusion of IDS logs
Journal of Computer Security
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
Studying Bluetooth Malware Propagation: The BlueBag Project
IEEE Security and Privacy
On predictive models and user-drawn graphical passwords
ACM Transactions on Information and System Security (TISSEC)
Communications of the ACM - 50th anniversary issue: 1958 - 2008
Vigilante: End-to-end containment of Internet worm epidemics
ACM Transactions on Computer Systems (TOCS)
Application of Information Retrieval Techniques for Source Code Authorship Attribution
DASFAA '09 Proceedings of the 14th International Conference on Database Systems for Advanced Applications
Computer viruses as artificial life
Artificial Life
Investigating the impact of real-world factors on internet worm propagation
ICISS'07 Proceedings of the 3rd international conference on Information systems security
Modeling worm propagation through hidden wireless connections
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Pushing boulders uphill: the difficulty of network intrusion recovery
LISA'09 Proceedings of the 23rd conference on Large installation system administration
Review of software security defects taxonomy
RSKT'10 Proceedings of the 5th international conference on Rough set and knowledge technology
Goals for computer security education
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Runtime countermeasures for code injection attacks against C and C++ programs
ACM Computing Surveys (CSUR)
Using active intrusion detection to recover network trust
LISA'11 Proceedings of the 25th international conference on Large Installation System Administration
Heedless programming: ignoring detectable error is a widespread hazard
Software—Practice & Experience
Defining value-based objectives for ERP systems planning
Decision Support Systems
Hi-index | 48.27 |
Last November the Internet was infected with a worm program that eventually spread to thousands of machines, disrupting normal activities and Internet connectivity for many days. The following article examines just how this worm operated.