skip to main content
10.1145/948187acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
WORM '03: Proceedings of the 2003 ACM workshop on Rapid malcode
ACM2003 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS03: Tenth ACM Conference on Computer and Communications Security 2003 Washington DC USA 27 October 2003
ISBN:
978-1-58113-785-9
Published:
27 October 2003
Sponsors:
Next Conference
October 14 - 18, 2024
Salt Lake City , UT , USA
Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
SESSION: Internet WORMS: past, present, and future
Article
Recent worms: a survey and trends

In this paper, we present a broad overview of recent worm activity. Virus information repositories, such as the Network Associates' Virus Information Library, contain over 4500 different entries (through the first quarter of 2003). While many of these ...

Article
A taxonomy of computer worms

To understand the threat posed by computer worms, it is necessary to understand the classes of worms, the attackers who may employ them, and the potential payloads. This paper describes a preliminary taxonomy based on worm target discovery and selection ...

Article
Access for sale: a new class of worm

The damage inflicted by viruses and worms has been limited by the risks that come with the more lucrative payloads. The problem facing authors of self-reproducing malware is that monetizing each intrusion requires the author to risk communication with ...

SESSION: Network interactions
Article
Simulating realistic network worm traffic for worm warning system design and testing

Reproducing the effects of large-scale worm attacks in a laboratory setup in a realistic and reproducible manner is an important issue for the development of worm detection and defense systems. In this paper, we describe a worm simulation model we are ...

Article
Experiences with worm propagation simulations

Fast Internet worms are a relatively new threat to Internet infrastructure and hosts. We discuss motivation and possibilities to study the behaviour of such worms and degrees of freedom that worm writers have. To facilitate the study of fast worms we ...

SESSION: Formation and simulation
Article
Worm anatomy and model

We present a general framework for reasoning about network worms and analyzing the potency of worms within a specific network. First, we present a discussion of the life cycle of a worm based on a survey of contemporary worms. We build on that life ...

Article
Worm propagation modeling and analysis under dynamic quarantine defense

Due to the fast spreading nature and great damage of Internet worms, it is necessary to implement automatic mitigation, such as dynamic quarantine, on computer networks. Enlightened by the methods used in epidemic disease control in the real world, we ...

Article
Modeling the effects of timing parameters on virus propagation

In this paper, we investigate epidemiological models to reason about computer viral propagation. We extend the classical homogeneous models to incorporate two timing parameters: Infection delay and user vigilance. We show that these timing parameters ...

SESSION: Defensive technology
Article
Epidemic profiles and defense of scale-free networks

In this paper, we study the defensibility of large scale-free networks against malicious rapidly self-propagating code such as worms and viruses. We develop a framework to investigate the profiles of such code as it infects a large network. Based on ...

Article
Detection of injected, dynamically generated, and obfuscated malicious code

This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locations (virtual addresses) of system calls within the software executables, ...

Contributors
  • Stanford University
  • University of California, San Diego

Recommendations