|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T U
Length: 243234 (0x3b622) Types: TextFile Notes: Uncompressed file
└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen └─⟦9743326e4⟧ »./worm/mit-ieee.ps.Z« └─⟦this⟧
%! %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % Do not edit this prologue file; edit tex.pro instead! /TeXDict 200 dict def TeXDict begin /Resolution 300 def /Inch{Resolution mul}def /Mtrx matrix def /a4const 340 def /usletterconst 310 def /a4{}def /letter{}def /note{}def /legal{}def /@a4 {a4 initmatrix 72 Resolution div dup neg scale 270 -3215 translate Mtrx currentmatrix pop }def /@letter {letter initmatrix 72 Resolution div dup neg scale usletterconst -3005 translate Mtrx currentmatrix pop }def /@note {note initmatrix 72 Resolution div dup neg scale usletterconst -3005 translate Mtrx currentmatrix pop }def /@landscape {letter initmatrix 72 Resolution div dup neg scale Mtrx currentmatrix 0 0.0 put Mtrx 1 -1.0 put Mtrx 2 1.0 put Mtrx 3 0.0 put Mtrx setmatrix 300 usletterconst translate Mtrx currentmatrix pop }def /@legal {legal initmatrix 72 Resolution div dup neg scale 295 -3880 translate Mtrx currentmatrix pop }def /@manualfeed {statusdict /manualfeed true put }def /@copies {/#copies exch def }def /@restore /restore load def /restore {vmstatus pop dup @VMused lt{pop @VMused}if exch pop exch @restore /@VMused exch def }def /@pri { ( ) print ( ) cvs print }def /@FontMatrix [1 0 0 -1 0 0] def /@FontBBox [0 0 1 1] def /@faceup{statusdict /setoutputtray known {statusdict begin end}if} def /@newfont {/newname exch def newname 7 dict def newname load begin /FontType 3 def /FontMatrix @FontMatrix def /FontBBox @FontBBox def /BitMaps 128 array def /BuildChar{CharBuilder}def /Encoding 256 array def 0 1 255 {Encoding exch /.undef put}for end newname newname load definefont pop }def /ch-image{ch-data 0 get}def /ch-width{ch-data 1 get}def /ch-height{ch-data 2 get}def /ch-xoff{ch-data 3 get}def /ch-yoff{ch-data 4 get}def /ch-tfmw{ch-data 5 get}def /CharBuilder {save 3 1 roll exch /BitMaps get exch get /ch-data exch def ch-data null ne {ch-tfmw 0 ch-xoff neg ch-yoff neg ch-width ch-xoff sub ch-height ch-yoff sub setcachedevice ch-width ch-height true [1 0 0 1 ch-xoff ch-yoff] {ch-image}imagemask }if restore }def /@sf {dup /FontName known {dup /FontName get tempstring cvs (SmallCaps) search {/smallcaps true def pop pop pop} {/smallcaps false def pop} ifelse } {/smallcaps false def} ifelse setfont }def /@dc {/ch-code exch def dup 0 get length 2 lt {pop [ <00> 1 1 0 0 8.00 ]} if /ch-data exch def currentfont /BitMaps get ch-code ch-data put currentfont /Encoding get ch-code dup ( ) cvs cvn put }def /@pc {pop /ch-data exch def currentpoint translate ch-width ch-height true [1 0 0 -1 ch-xoff ch-yoff] {ch-image}imagemask }def /@bop0 {pop }def /@bop1 {pop erasepage initgraphics Mtrx setmatrix /SaveImage save def }def /@eop {showpage SaveImage restore }def /@start {@letter vmstatus pop /@VMused exch def pop }def /@end {(VM used: ) print @VMused @pri (. Unused: ) print vmstatus @VMused sub @pri pop pop (\n) print flush end }def /p {moveto }def /r {0 rmoveto }def /s {smallcaps {SmallCapShow}{show} ifelse }def /c {c-string exch 0 exch put c-string s }def /c-string ( ) def /ru {/dy exch neg def /dx exch def /x currentpoint /y exch def def newpath x y moveto dx 0 rlineto 0 dy rlineto dx neg 0 rlineto closepath fill x y moveto }def /@SpecialDefaults {/hs 8.5 Inch def /vs 11 Inch def /ho 0 def /vo 0 def /hsc 1 def /vsc 1 def /CLIP false def }def /@hsize{/hs exch def /CLIP true def}def /@vsize{/vs exch def /CLIP true def}def /@hoffset{/ho exch def}def /@voffset{/vo exch def}def /@hscale{/hsc exch def}def /@vscale{/vsc exch def}def /@setclipper {hsc vsc scale CLIP {newpath 0 0 moveto hs 0 rlineto 0 vs rlineto hs neg 0 rlineto closepath clip} if }def /@beginspecial {gsave /SpecialSave save def currentpoint transform initgraphics itransform translate @SpecialDefaults /showpage{}def }def /@setspecial { MacDrwgs {md begin /pxt ho def /pyt vo neg def end} {ho vo translate @setclipper} ifelse }def /@endspecial {SpecialSave restore grestore }def /ReEncodeForTeX {/newfontname exch def /basefontname exch def /TeXstr 30 string def /basefontdict basefontname findfont def /newfont basefontdict maxlength dict def basefontdict {exch dup /FID ne {dup /Encoding eq {exch dup length array copy newfont 3 1 roll put} {exch newfont 3 1 roll put} ifelse } {pop pop} ifelse }forall basefontname TeXstr cvs (Dingbat) search {pop pop pop} {pop /TeXvec basefontname TeXstr cvs (Courier) search {pop pop pop TeXcourvec} {pop TeXnormalvec} ifelse def TeXvec aload pop TeXvec length 2 idiv {newfont /Encoding get 3 1 roll put} repeat } ifelse newfontname newfont definefont pop }def /TeXnormalvec [ 8#014 /fi 8#015 /fl 8#020 /dotlessi 8#022 /grave 8#023 /acute 8#024 /caron 8#025 /breve 8#026 /macron 8#027 /ring 8#030 /cedilla 8#031 /germandbls 8#032 /ae 8#033 /oe 8#034 /oslash 8#035 /AE 8#036 /OE 8#037 /Oslash 8#042 /quotedblright 8#074 /exclamdown 8#076 /questiondown 8#134 /quotedblleft 8#136 /circumflex 8#137 /dotaccent 8#173 /endash 8#174 /emdash 8#175 /quotedbl 8#176 /tilde 8#177 /dieresis ] def /TeXcourvec [ 8#016 /exclamdown 8#017 /questiondown 8#020 /dotlessi 8#022 /grave 8#023 /acute 8#024 /caron 8#025 /breve 8#026 /macron 8#027 /ring 8#030 /cedilla 8#031 /germandbls 8#032 /ae 8#033 /oe 8#034 /oslash 8#035 /AE 8#036 /OE 8#037 /Oslash 8#074 /less 8#076 /greater 8#134 /backslash 8#136 /circumflex 8#137 /underscore 8#173 /braceleft 8#174 /bar 8#175 /braceright 8#176 /tilde 8#177 /dieresis ] def /TeXPSmakefont{ /TeXsize exch def findfont [ TeXsize 0 0 TeXsize neg 0 0 ] makefont }def /ObliqueFont{ /ObliqueAngle exch def /ObliqueBaseName exch def /ObliqueFontName exch def /ObliqueTransform [1 0 ObliqueAngle sin ObliqueAngle cos div 1 0 0] def /basefontdict ObliqueBaseName findfont ObliqueTransform makefont def /newfont basefontdict maxlength dict def basefontdict {exch dup /FID ne {dup /Encoding eq {exch dup length array copy newfont 3 1 roll put} {exch newfont 3 1 roll put} ifelse } {pop pop} ifelse }forall newfont /FontName ObliqueFontName put ObliqueFontName newfont definefont pop }def /Times-Oblique /Times-Roman 15.5 ObliqueFont /Times-BoldOblique /Times-Bold 15 ObliqueFont /Times-ItalicUnslanted /Times-Italic -15.15 ObliqueFont /SmallCapsFont{ /SmallCapsBaseName exch def /SmallCapsFontName exch def /basefontdict SmallCapsBaseName findfont def /newfont basefontdict maxlength dict def basefontdict {exch dup /FID ne {dup /Encoding eq {exch dup length array copy newfont 3 1 roll put} {exch newfont 3 1 roll put} ifelse } {pop pop} ifelse }forall newfont /FontName SmallCapsFontName put SmallCapsFontName newfont definefont pop }def /Times-SmallCaps /Times-Roman SmallCapsFont FontDirectory /Palatino-Roman known { /Palatino-Oblique /Palatino-Roman 10 ObliqueFont /Palatino-BoldOblique /Palatino-Bold 10 ObliqueFont /Palatino-SmallCaps /Palatino-Roman SmallCapsFont }if FontDirectory /NewCenturySchlbk-Roman known { /NewCenturySchlbk-Oblique /NewCenturySchlbk-Roman 16 ObliqueFont /NewCenturySchlbk-ItalicUnslanted /NewCenturySchlbk-Italic -16 ObliqueFont /NewCenturySchlbk-SmallCaps /NewCenturySchlbk-Roman SmallCapsFont }if /SmallCapShow{ /achar (A) def /xfac 0.8 def /yfac 0.8 def /xrec 1 xfac div def /yrec 1 yfac div def {dup dup 8#141 ge exch 8#172 le and {8#40 sub achar exch 0 exch put achar xfac yfac scale show xrec yrec scale} {achar exch 0 exch put achar show} ifelse }forall }def /tempstring 100 string def /MacDrwgs false def /@MacSetUp {userdict /md known {userdict /md get type /dicttype eq {/MacDrwgs true def md begin /psu /psu load {/letter {}def /note{}def /legal{}def statusdict /waittimeout 300 put /page{pop}def /pyt vo neg def /pxt ho def } concatprocs def /od /od load {@setclipper} concatprocs def end} if} if }def /concatprocs {/p2 exch cvlit def /p1 exch cvlit def /p p1 length p2 length add array def p 0 p1 putinterval p p1 length p2 putinterval p cvx }def end statusdict /waittimeout 300 put TeXDict begin @start %%Title: main.dvi %%Creator: dvi2ps %%EndProlog 1 @bop0 /Times-Roman /t-rom.510 ReEncodeForTeX /t-rom.510 /t-rom.510 70.568701 TeXPSmakefont def /cmsy10.360 @newfont cmsy10.360 @sf [<00C00000E00000C00000C00040C080E0C1C0F8C7C07CCF801FFE0007F80001E00007F8001FFE007CCF80F8C7C0E0C1C040C0 8000C00000C00000E00000C000> 18 21 -3 -2 25] 3 @dc /Times-Roman /t-rom.360 ReEncodeForTeX /t-rom.360 /t-rom.360 49.813200 TeXPSmakefont def /Times-Bold /t-bol.300 ReEncodeForTeX /t-bol.300 /t-bol.300 41.511000 TeXPSmakefont def /Times-Roman /t-rom.300 ReEncodeForTeX /t-rom.300 /t-rom.300 41.511000 TeXPSmakefont def /Times-Bold /t-bol.420 ReEncodeForTeX /t-bol.420 /t-bol.420 58.115401 TeXPSmakefont def /cmr7.300 @newfont cmr7.300 @sf [<7FE07FE00E000E000E000E000E000E000E000E000E000E000E000E000E00EE00FE001E000600> 11 19 -2 0 17] 49 @dc /Times-Bold /t-bol.360 ReEncodeForTeX /t-bol.360 /t-bol.360 49.813200 TeXPSmakefont def /cmsy6.300 @newfont cmsy6.300 @sf [<0C000E00CCC0FFC0FFC03F00FFC0FFC0CCC00E000C00> 10 11 -3 -1 16] 3 @dc /Times-Roman /t-rom.240 ReEncodeForTeX /t-rom.240 /t-rom.240 33.208800 TeXPSmakefont def /cmsy8.300 @newfont cmsy8.300 @sf [<001FE00000FFFC0003F03F00078007800E0001C01C0000E038000070300000307000003860000018E000001CC000000CC000 000CC000000CC000000CC000000CC000000CC000000CE000001C600000187000003830000030380000701C0000E00E0001C0 0780078003F03F0000FFFC00001FE000> 30 29 -2 6 35] 13 @dc /cmr6.300 @newfont cmr6.300 @sf [<FF80FF801C001C001C001C001C001C001C001C001C001C009C00FC007C000C00> 9 16 -2 0 15] 49 @dc 1 @bop1 t-rom.510 @sf 519 229 p 87 c -2 r (ith) s 16 r (Microscope) s 20 r (and) s 19 r 84 c -4 r (weezers:) s 222 320 p (An) s 17 r (Analysis) s 19 r (of) s 18 r (the) s 18 r (Internet) s 19 r 86 c -3 r (irus) s 18 r (of) s 18 r (November) s 20 r (1988) s cmsy10.360 @sf 1728 295 p 3 c t-rom.360 @sf 620 441 p (Mark) s 13 r 87 c -4 r 46 c 12 r (Eichin) s 13 r (and) s 12 r (Jon) s 13 r (A.) s 12 r (Rochlis) s 593 557 p (Massachusetts) s 14 r (Institute) s 12 r (of) s 12 r 84 c -2 r (echnology) s 621 615 p (77) s 12 r (Massachusetts) s 14 r 65 c -3 r (venue,) s 12 r (E40-31) s -1 r 49 c 743 673 p (Cambridge,) s 12 r (MA) s 13 r (02139) s t-bol.300 @sf 373 836 p (Abstract) s t-rom.300 @sf 4 928 p (In) s 9 r (early) s 10 r (November) s 9 r (1988) s 9 r (the) s 9 r (Internet,) s 10 r 97 c 10 r (collection) s 8 r (of) s 9 r (net-) s -36 978 p (works) s 12 r (consisting) s 12 r (of) s 14 r (60,000) s 13 r (host) s 13 r (computers) s 14 r (implementing) s -36 1027 p (the) s 11 r (TCP/IP) s 12 r (protocol) s 11 r (suite,) s 14 r (was) s 13 r (attacked) s 13 r (by) s 12 r 97 c 13 r (virus,) s 13 r 97 c 13 r (pro-) s -36 1077 p (gram) s 6 r (which) s 7 r (broke) s 7 r (into) s 6 r (computers) s 7 r (on) s 7 r (the) s 7 r (network) s 7 r (and) s 7 r (which) s -36 1127 p (spread) s 6 r (from) s 7 r (one) s 7 r (machine) s 8 r (to) s 6 r (another) s -1 r 46 c 11 r (This) s 7 r (paper) s 8 r (is) s 6 r 97 c 8 r (detailed) s -36 1177 p (analysis) s 10 r (of) s 12 r (the) s 12 r (virus) s 11 r (program.W) s -2 r 101 c 11 r (describe) s 12 r (the) s 12 r (lessons) s 12 r (that) s -36 1227 p (thi) s -1 r 115 c 10 r (incident) s 11 r (has) s 12 r (taught) s 10 r (the) s 12 r (Internet) s 11 r (community) s 11 r (and) s 11 r (topics) s -36 1277 p (for) s 10 r (future) s 11 r (consideration) s 10 r (and) s 12 r (resolution.) s 16 r 65 c 12 r (detailed) s 11 r (routine) s -36 1326 p (by) s 12 r (routine) s 13 r (description) s 13 r (of) s 14 r (the) s 14 r (virus) s 14 r (program) s 14 r (including) s 12 r (the) s -36 1376 p (contents) s 8 r (of) s 10 r (its) s 10 r (built) s 8 r (in) s 10 r (dictionary) s 9 r (is) s 10 r (provided.) s t-bol.420 @sf -36 1517 p 49 c 57 r (Intr) s (oduction) s t-rom.300 @sf -36 1610 p (The) s 9 r (Internet[) s 49 c -1 r (][) s 50 c -1 r (],) s 11 r 97 c 10 r (collection) s 9 r (of) s 10 r (interconnected) s 9 r (networks) s -36 1660 p (lin) s -1 r (kin) s -1 r 103 c 6 r (approximately) s 7 r (60,000) s 7 r (computers,) s 9 r (was) s 9 r (attacked) s 8 r (by) s 8 r 97 c -36 1710 p (viru) s -1 r 115 c 9 r (program) s 10 r (on) s 10 r 50 c 11 r (November) s 11 r (1988.) s 13 r (The) s 11 r (Internet) s 10 r (commu-) s -36 1759 p (nit) s -1 r 121 c 13 r (is) s 14 r (comprised) s 14 r (of) s 14 r (academic,) s 18 r (corporate,) s 16 r (and) s 14 r (goverment) s -36 1809 p (research) s 12 r (users,) s 14 r (all) s 13 r (seeking) s 12 r (to) s 12 r (exchange) s 14 r (information) s 10 r (to) s 12 r (en-) s -36 1859 p (hance) s 10 r (their) s 9 r (research) s 12 r (ef) s (forts.) s 4 1909 p (The) s 22 r (virus) s 20 r (broke) s 21 r (into) s 20 r (Berkeley) s 22 r (Standard) s 21 r (Distribut) s -1 r (ion) s -36 1959 p (\(BSD\)) s 10 r (UNIX) s cmr7.300 @sf 187 1945 p 49 c t-rom.300 @sf 218 1959 p (and) s 12 r (derivative) s 12 r (systems.) s 21 r (Once) s 13 r (resident) s 11 r (in) s 12 r 97 c -36 2009 p (computer) s -1 r 44 c 9 r (it) s 10 r (attempted) s 11 r (to) s 10 r (break) s 12 r (into) s 9 r (other) s 10 r (machines) s 12 r (on) s 11 r (the) s -36 2058 p (network.) s 24 r (This) s 14 r (paper) s 15 r (is) s 14 r (an) s 15 r (analysis) s 14 r (of) s 14 r (that) s 13 r (virus) s 14 r (program) s -36 2108 p (and) s 8 r (of) s 10 r (the) s 10 r (reaction) s 9 r (of) s 10 r (the) s 10 r (Internet) s 9 r (community) s 9 r (to) s 9 r (the) s 10 r (attack.) s t-bol.360 @sf -36 2228 p (1.1) s 49 r (Organization) s t-rom.300 @sf -36 2306 p (In) s 11 r (Section) s 12 r 49 c 13 r (we) s 13 r (discuss) s 13 r (the) s 12 r (categorization) s 12 r (of) s 12 r (the) s 13 r (program) s -36 2356 p (which) s 12 r (attacked) s 14 r (the) s 13 r (Internet,) s 15 r (the) s 13 r (goals) s 14 r (of) s 13 r (the) s 14 r (teams) s 14 r (work-) s -36 2405 p (ing) s 9 r (on) s 12 r (isolating) s 10 r (the) s 11 r (virus) s 11 r (and) s 12 r (the) s 12 r (methods) s 11 r (they) s 11 r (employed,) s -36 2442 p 390 2 ru cmsy6.300 @sf 4 2469 p 3 c t-rom.240 @sf 22 2480 p (Copyright) s 16 r 99 c cmsy8.300 @sf -26 r 13 c t-rom.240 @sf 7 r (1988) s 5 r (Massachuse) s -1 r (tts) s 5 r (Institute) s 6 r (of) s 6 r 84 c -1 r (echnolog) s -1 r 121 c -2 r 46 c 8 r (This) s 7 r (paper) s -36 2520 p (will) s 9 r (be) s 10 r (presented) s 8 r (at) s 10 r (the) s 10 r (1989) s 9 r (IEEE) s 11 r (Symposium) s 9 r (on) s 9 r (Research) s 9 r (in) s 10 r (Security) s -36 2559 p (and) s 6 r (Privacy) s -1 r 46 c cmr6.300 @sf 5 2588 p 49 c t-rom.240 @sf 22 2599 p (UNIX) s 7 r (is) s 7 r 97 c 6 r (trademark) s 6 r (of) s 6 r 65 c -3 r (T&T) s -1 r 46 c 6 r (DEC,) s 7 r 86 c -3 r (AX,) s 6 r (and) s 6 r (Ultrix) s 7 r (are) s 6 r (trademarks) s -36 2638 p (of) s 7 r (Digitial) s 7 r (Equipment) s 6 r (Corporation.) s 10 r (Sun,) s 8 r (SunOS,) s 8 r (and) s 6 r (NFS) s 9 r (are) s 7 r (trademarks) s -36 2678 p (of) s 8 r (Sun) s 9 r (Microsystems,) s 8 r (Inc.) s 15 r (IBM) s 9 r (is) s 10 r 97 c 9 r (trademark) s 8 r (of) s 9 r (International) s 8 r (Business) s -36 2717 p (Mach) s -1 r (ines,) s 6 r (Inc.) s t-rom.300 @sf 1012 836 p (and) s 12 r (summarize) s 13 r (what) s 11 r (the) s 11 r (virus) s 11 r (did) s 11 r (and) s 11 r (did) s 11 r (not) s 11 r (actually) s 11 r (do.) s 1012 886 p (In) s 11 r (Section) s 11 r 50 c 11 r (we) s 11 r (discuss) s 11 r (in) s 10 r (more) s 12 r (detail) s 10 r (the) s 11 r (strategies) s 11 r (it) s 10 r (em-) s 1012 935 p (ployed,) s 16 r (the) s 14 r (speci) s 174 c 99 c 15 r (attacks) s 15 r (it) s 14 r (used,) s 16 r (and) s 15 r (the) s 14 r (ef) s (fective) s 15 r (and) s 1012 985 p (inef) s (fective) s 10 r (defenses) s 11 r (proposed) s 9 r (by) s 10 r (the) s 10 r (community) s -2 r 46 c 13 r (Once) s 11 r (the) s 1012 1035 p (crisis) s 9 r (had) s 8 r (passed,) s 10 r (the) s 8 r (Internet) s 8 r (community) s 7 r (had) s 9 r (time) s 8 r (not) s 8 r (only) s 1012 1085 p (to) s 11 r (explore) s 10 r (the) s 11 r (vulnerabilit) s -1 r (ies) s 9 r (which) s 11 r (had) s 10 r (allowed) s 11 r (the) s 10 r (attack) s 1012 1135 p (to) s 14 r (succeed,) s 17 r (but) s 14 r (also) s 14 r (to) s 13 r (consider) s 14 r (how) s 14 r (future) s 14 r (attacks) s 14 r (could) s 1012 1184 p (be) s 13 r (prevented.) s 19 r (Section) s 12 r 51 c 11 r (presents) s 13 r (our) s 11 r (views) s 12 r (on) s 12 r (the) s 12 r (lessons) s 1012 1234 p (learned) s 13 r (and) s 11 r (problems) s 12 r (to) s 11 r (be) s 12 r (faced) s 13 r (in) s 11 r (the) s 12 r (future.) s 17 r (In) s 12 r (Section) s 1012 1284 p 52 c 13 r (we) s 13 r (acknowledge) s 13 r (the) s 12 r (people) s 12 r (on) s 12 r (our) s 12 r (team) s 14 r (and) s 12 r (the) s 13 r (people) s 1012 1334 p (at) s 14 r (other) s 13 r (sites) s 13 r (who) s 13 r (aided) s 13 r (us) s 14 r (in) s 12 r (the) s 13 r (ef) s (fort) s 12 r (to) s 13 r (understand) s 13 r (the) s 1012 1384 p (virus.) s 1054 1438 p 87 c -2 r 101 c 9 r (present) s 10 r 97 c 10 r (subroutine) s 8 r (by) s 10 r (subroutine) s 8 r (description) s 8 r (of) s 10 r (the) s 1012 1488 p (virus) s 14 r (program) s 15 r (itself) s 14 r (in) s 14 r (Appendix) s 14 r (A,) s 16 r (including) s 13 r 97 c 15 r (diagram) s 1012 1538 p (of) s 15 r (the) s 15 r (information) s 13 r 175 c (ow) s 14 r (through) s 13 r (the) s 15 r (routines) s 14 r (which) s 14 r (com-) s 1012 1587 p (prise) s 11 r (the) s 10 r 96 c -2 r (`cracking) s 9 r (engine') s -2 r ('.) s 12 r (Appendix) s 9 r 66 c 10 r (contains) s 10 r 97 c 11 r (list) s 9 r (of) s 1012 1637 p (the) s 11 r (words) s 11 r (included) s 10 r (in) s 10 r (the) s 11 r (built-) s -1 r (in) s 9 r (dictionary) s 9 r (carried) s 11 r (by) s 11 r (the) s 1012 1687 p (virus.) s t-bol.360 @sf 1012 1830 p (1.2) s 51 r 65 c 19 r (Rose) s 19 r (by) s 19 r (Any) s 18 r (Other) s 19 r (Name) s t-rom.300 @sf 1012 1916 p (The) s 10 r (question) s 7 r (of) s 8 r (how) s 8 r (to) s 8 r (classify) s 9 r (the) s 8 r (program) s 9 r (which) s 8 r (infected) s 1012 1965 p (the) s 11 r (Internet) s 10 r (has) s 12 r (received) s 11 r 97 c 12 r (fair) s 10 r (amount) s 11 r (of) s 11 r (attention.) s 14 r 87 c -2 r (as) s 10 r (it) s 1012 2015 p 97 c 11 r 96 c -2 r (`virus') s -3 r 39 c 8 r (or) s 10 r 96 c -2 r (`worm') s -3 r (';) s 8 r (or) s 10 r (was) s 11 r (it) s 9 r (something) s 9 r (else?) s 1054 2069 p (There) s 14 r (is) s 12 r (confusion) s 11 r (about) s 12 r (the) s 13 r (term) s 13 r 96 c -2 r (`vir) s -1 r (us.') s -3 r 39 c 19 r 84 c -2 r 111 c 12 r 97 c 13 r (biolo-) s 1012 2119 p (gist) s 7 r 97 c 9 r (virus) s 7 r (is) s 8 r (an) s 8 r (agent) s 8 r (of) s 8 r (infection) s 6 r (which) s 8 r (can) s 8 r (only) s 7 r (grow) s 8 r (and) s 1012 2169 p (reproduce) s 11 r (within) s 9 r 97 c 11 r (host) s 10 r (cell.) s 15 r 65 c 10 r (lytic) s 10 r (virus) s 9 r (enters) s 11 r 97 c 11 r (cell) s 11 r (and) s 1012 2219 p (uses) s 13 r (the) s 12 r (cell') s -1 r 115 c 11 r (own) s 12 r (metabolic) s 11 r (machinery) s 13 r (to) s 11 r (replicate.) s 20 r (The) s 1012 2269 p (newly) s 8 r (created) s 9 r (viruses) s 8 r (\(more) s 9 r (appropriately) s 6 r (called) s 9 r 96 c -2 r (`vir) s -1 r (ons') s -3 r ('\)) s 1012 2319 p (break) s 13 r (out) s 12 r (of) s 12 r (the) s 12 r (infected) s 12 r (cell,) s 14 r (destroying) s 11 r (it,) s 12 r (and) s 13 r (then) s 12 r (seek) s 1012 2368 p (out) s 13 r (new) s 14 r (cells) s 14 r (to) s 13 r (infect.) s 24 r 65 c 14 r (lysogenetic) s 13 r (virus,) s 14 r (on) s 14 r (the) s 13 r (other) s 1012 2418 p (hand,) s 18 r (alters) s 16 r (the) s 15 r (genetic) s 16 r (material) s 16 r (of) s 15 r (its) s 15 r (host) s 16 r (cells.) s 30 r (When) s 1012 2468 p (the) s 15 r (host) s 14 r (cell) s 15 r (reproduces) s 15 r (it) s 14 r (unwitting) s -1 r (ly) s 13 r (reproduces) s 15 r (the) s 14 r (vi-) s 1012 2518 p (ral) s 13 r (genes.) s 21 r (At) s 12 r (some) s 14 r (point) s 11 r (in) s 12 r (the) s 12 r (future,) s 13 r (the) s 12 r (viral) s 12 r (genes) s 13 r (are) s 1012 2568 p (activated) s 11 r (and) s 11 r (many) s 11 r (virons) s 10 r (are) s 11 r (produced) s 11 r (by) s 10 r (the) s 11 r (cell.) s 15 r (These) s 1012 2617 p (proceed) s 13 r (to) s 11 r (break) s 11 r (out) s 11 r (of) s 11 r (the) s 12 r (cell) s 12 r (and) s 11 r (seek) s 13 r (out) s 10 r (other) s 11 r (cells) s 12 r (to) s 1012 2667 p (infect[) s 51 c (].) s 19 r (Some) s 13 r (single) s 12 r (strand) s 12 r (DNA) s 12 r (viruses) s 12 r (do) s 12 r (not) s 11 r (kill) s 11 r (the) s 1012 2717 p (host) s 12 r (cell;) s 12 r (they) s 12 r (use) s 12 r (the) s 12 r (machinery) s 12 r (of) s 12 r (the) s 11 r (host) s 12 r (cell) s 12 r (to) s 11 r (repro-) s @eop 2 @bop0 /Times-Italic /t-ita.300 ReEncodeForTeX /t-ita.300 /t-ita.300 41.511000 TeXPSmakefont def /cmsy10.300 @newfont cmsy10.300 @sf [<07E01FF83FFC7FFE7FFEFFFFFFFFFFFFFFFFFFFFFFFF7FFE7FFE3FFC1FF807E0> 16 16 -2 -2 21] 15 @dc 2 @bop1 t-rom.300 @sf -36 96 p (duce) s 11 r (\(perhaps) s 11 r (slowing) s 11 r (normal) s 11 r (celluar) s 12 r (growth) s 10 r (by) s 12 r (diverting) s -36 146 p (resources\)) s 7 r (and) s 8 r (exit) s 7 r (the) s 8 r (cells) s 8 r (in) s 7 r 97 c 8 r (non-destructive) s 6 r (manner[) s 52 c (].) s 4 201 p 65 c 11 r 96 c -2 r (`worm') s -3 r 39 c 8 r (is) s 11 r (an) s 10 r (or) s (ganism) s 10 r (with) s 9 r (an) s 11 r (elongated) s 10 r (segmented) s -36 251 p (body) s -3 r 46 c 34 r (Because) s 19 r (of) s 17 r (the) s 17 r (shape) s 18 r (of) s 18 r (their) s 16 r (bodies) s 17 r (worms) s 18 r (can) s -36 300 p (snake) s 8 r (around) s 8 r (obstacles) s 8 r (and) s 9 r (work) s 8 r (their) s 7 r (way) s 9 r (into) s 7 r (unexpected) s -36 350 p (places.) s 15 r (Some) s 11 r (worms,) s 11 r (for) s 11 r (example) s 11 r (the) s 10 r (tapeworm,) s 12 r (are) s 11 r (para-) s -36 400 p (sites.) s 15 r (They) s 12 r (live) s 10 r (inside) s 10 r (of) s 11 r 97 c 12 r (host) s 10 r (or) s (ganism,) s 11 r (feeding) s 11 r (directly) s -36 450 p (from) s 14 r (nutrients) s 15 r (intended) s 15 r (for) s 15 r (host) s 16 r (cells.) s 31 r (These) s 17 r (worms) s 16 r (re-) s -36 500 p (produ) s -1 r (ce) s 10 r (by) s 10 r (shedding) s 9 r (one) s 11 r (of) s 10 r (their) s 10 r (segments) s 11 r (which) s 10 r (contains) s -36 550 p (many) s 15 r (eggs.) s 30 r (They) s 16 r (have) s 17 r (dif) s 174 c (cult) s -1 r 121 c 14 r (in) s 15 r (reaching) s 16 r (new) s 16 r (hosts,) s -36 599 p (since) s 10 r (they) s 10 r (usually) s 9 r (leave) s 12 r (an) s 11 r (infected) s 10 r (host) s 10 r (through) s 9 r (its) s 10 r (excre-) s -36 649 p (tory) s 7 r (system) s 9 r (and) s 9 r (may) s 10 r (not) s 8 r (readily) s 9 r (come) s 10 r (into) s 7 r (contact) s 9 r (with) s 8 r (an-) s -36 699 p (other) s 8 r (host[) s 53 c -1 r (].) s 4 754 p (In) s 12 r (deciding) s 12 r (which) s 12 r (term) s 13 r 174 c (ts) s 12 r (the) s 12 r (program) s 13 r (which) s 12 r (infected) s -36 804 p (the) s 13 r (Internet,) s 16 r (we) s 16 r (must) s 15 r (decide) s 15 r (which) s 15 r (part) s 15 r (of) s 14 r (the) s 15 r (system) s 16 r (is) s -36 854 p (analogous) s 8 r (to) s 9 r (the) s 10 r 96 c -2 r (`host') s -3 r ('.) s 12 r (Possibilit) s -1 r (ies) s 9 r (include) s 9 r (the) s 10 r (network,) s -36 903 p (host) s 13 r (computers,) s 17 r (programs,) s 17 r (and) s 15 r (processes.) s 31 r 87 c -2 r 101 c 14 r (must) s 16 r (also) s -36 953 p (consider) s 9 r (the) s 10 r (actions) s 10 r (of) s 10 r (the) s 10 r (program) s 10 r (and) s 10 r (its) s 10 r (structure.) s 4 1008 p 86 c -1 r (iewing) s 10 r (the) s 12 r (network) s 11 r (layer) s 12 r (as) s 13 r (the) s 12 r 96 c -2 r (`host) s -1 r 39 c -3 r 39 c 10 r (is) s 12 r (not) s 11 r (fruitful;) s -36 1058 p (the) s 7 r (network) s 8 r (was) s 10 r (not) s 8 r (attacked,) s 10 r (speci) s 174 c 99 c 10 r (hosts) s 8 r (on) s 9 r (the) s 8 r (network) s -36 1108 p (were.) s 15 r (The) s 11 r (infection) s 9 r (never) s 11 r (spread) s 12 r (beyond) s 10 r (the) s 10 r (Internet) s 10 r (even) s -36 1158 p (thou) s -1 r (gh) s 15 r (there) s 18 r (were) s 18 r (gateways) s 18 r (to) s 16 r (other) s 17 r (types) s 17 r (of) s 17 r (networks.) s -36 1207 p (One) s 9 r (could) s 9 r (view) s 10 r (the) s 9 r (infection) s 9 r (as) s 10 r 97 c 11 r (worm,) s 10 r (which) s 10 r 96 c -2 r (`wig) s -1 r (gled') s -3 r 39 c -36 1257 p (thro) s -1 r (ugho) s -1 r (ut) s 8 r (the) s 11 r (network.) s 14 r (But) s 10 r (as) s 12 r (Beckman) s 11 r (points) s 10 r (out[) s 54 c -2 r 93 c 11 r (the) s -36 1307 p (progr) s -1 r (am) s 12 r (didn') s 116 c 11 r (have) s 14 r (connected) s 13 r 96 c -2 r (`segments') s -2 r 39 c 11 r (in) s 13 r (any) s 13 r (sense.) s -36 1357 p (Thus) s 9 r (it) s 9 r (can') s 116 c 10 r (be) s 11 r 97 c 10 r (worm.) s 4 1412 p 65 c 13 r (model) s 13 r (showing) s 12 r (the) s 13 r (computers) s 13 r (as) s 14 r (the) s 13 r 96 c -2 r (`host') s -4 r 39 c 11 r (is) s 13 r (more) s -36 1461 p (promisi) s -1 r (ng.) s 12 r (The) s 11 r (infection) s 8 r (of) s 10 r 50 c 10 r (November) s 11 r (entered) s 10 r (the) s 10 r (hosts,) s -36 1511 p (reproduced,) s 17 r (and) s 17 r (exited) s 16 r (in) s 16 r (search) s 17 r (of) s 17 r (new) s 17 r (hosts) s 16 r (to) s 16 r (infect.) s -36 1561 p (Some) s 13 r (people) s 14 r (might) s 14 r (ar) s (gue) s 13 r (that) s 14 r (since) s 15 r (the) s 14 r (host) s 13 r (was) s 15 r (not) s 13 r (de-) s -36 1611 p (stroyed) s 6 r (in) s 7 r (this) s 8 r (process,) s 9 r (that) s 8 r (the) s 8 r (infecting) s 7 r (program) s 7 r (was) s 9 r (more) s -36 1661 p (lik) s -1 r 101 c 10 r 97 c 11 r (worm) s 11 r (than) s 10 r 97 c 11 r (virus.) s 15 r (But,) s 11 r (as) s 11 r (mentioned) s 10 r (earlier) s -1 r 44 c 11 r (not) s 10 r (all) s -36 1711 p (viru) s -1 r (ses) s 9 r (destroy) s 9 r (their) s 8 r (host) s 9 r (cells.) s 14 r (Denning) s 9 r 91 c 55 c -1 r 93 c 10 r (de) s 174 c (nes) s 10 r 97 c 10 r (com-) s -36 1760 p (puter) s 12 r (worm) s 13 r (as) s 15 r 97 c 14 r (program) s 13 r (which) s 14 r (enters) s 13 r 97 c 15 r (workstation) s 12 r (and) s -36 1810 p (disables) s 7 r (it.) s 13 r (In) s 8 r (that) s 8 r (sense) s 10 r (the) s 9 r (infection) s 7 r (could) s 8 r (be) s 9 r (considered) s 9 r 97 c -36 1860 p (worm,) s 8 r (but) s 7 r (we) s 9 r (reject) s 9 r (this) s 7 r (de) s 174 c (nition.) s 12 r (The) s 9 r (infected) s 9 r (computers) s -36 1910 p (were) s 9 r (af) s (fected) s 10 r (but) s 9 r (not) s 9 r (all) s 9 r (were) s 10 r 96 c -2 r (`disabled') s -3 r ('.) s 12 r (There) s 11 r (is) s 9 r (also) s 10 r (no) s -36 1960 p (analog) s 9 r (to) s 9 r (the) s 10 r (segments) s 11 r (of) s 10 r 97 c 11 r (biological) s 8 r (worm.) s 4 2015 p (Denning) s 18 r (has) s 20 r (described) s 19 r (how) s 18 r (many) s 20 r (personal) s 19 r (computer) s -36 2064 p (progr) s -1 r (ams) s 12 r (have) s 13 r (been) s 13 r (infected) s 12 r (by) s 12 r (viral) s 12 r (programs[) s 55 c -1 r (].) s 20 r (These) s -36 2114 p (are) s 18 r (frequently) s 18 r (analogous) s 19 r (to) s 18 r (lysogenetic) s 18 r (viruses) s 19 r (because) s -36 2164 p (they) s 9 r (modify) s 10 r (the) s 11 r (actual) s 11 r (program) s 11 r (code) s 11 r (as) s 12 r (stored) s 10 r (in) s 10 r (the) s 11 r (com-) s -36 2214 p (puter) s 1 r 39 c -2 r 115 c 14 r (secondary) s 16 r (storage.) s 30 r (As) s 16 r (the) s 15 r (infected) s 15 r (programs) s 16 r (are) s -36 2264 p (copied) s 15 r (from) s 16 r (computer) s 16 r (to) s 16 r (computer) s 16 r (through) s 14 r (normal) s 16 r (soft-) s -36 2313 p (ware) s 14 r (distribu) s -1 r (tio) s -1 r (n,) s 14 r (the) s 14 r (viral) s 14 r (code) s 14 r (is) s 15 r (also) s 14 r (copied.) s 26 r (At) s 14 r (some) s -36 2363 p (poin) s -1 r 116 c 9 r (the) s 11 r (viral) s 10 r (code) s 12 r (may) s 12 r (activate) s 11 r (and) s 11 r (perform) s 11 r (some) s 12 r (action) s -36 2413 p (such) s 13 r (as) s 15 r (deleting) s 13 r 174 c (les) s 15 r (or) s 14 r (displaying) s 13 r 97 c 14 r (message.) s 29 r (Applying) s -36 2463 p (thi) s -1 r 115 c 6 r (de) s 174 c (nition) s 6 r (of) s 7 r 97 c 8 r (virus) s 6 r (while) s 7 r (viewing) s 7 r (programs) s 7 r (as) s 8 r 96 c -2 r (`hosts') s -3 r 39 c -36 2513 p (does) s 8 r (not) s 8 r (work) s 8 r (for) s 9 r (the) s 8 r (Internet) s 8 r (infection,) s 9 r (since) s 9 r (the) s 9 r (virus) s 8 r (nei-) s -36 2562 p (ther) s 8 r (attacked) s 11 r (nor) s 10 r (modi) s 174 c (ed) s 10 r (programs) s 10 r (in) s 10 r (any) s 10 r (way) s -2 r 46 c 4 2617 p (If,) s 12 r (however) s -1 r 44 c 11 r (processes) s 12 r (are) s 13 r (view) s 11 r (as) s 12 r 96 c -2 r (`host) s -1 r (s') s -3 r (',) s 10 r (then) s 11 r (the) s 11 r (In-) s -36 2667 p (ternet) s 9 r (infection) s 10 r (can) s 12 r (clearly) s 12 r (be) s 11 r (considered) s 11 r 97 c 12 r (viral) s 11 r (infection.) s -36 2717 p (The) s 9 r (virus) s 8 r (entered) s 10 r (hosts) s 9 r (through) s 8 r 97 c 10 r (daemon) s 10 r (process,) s 10 r (tricking) s 1012 96 p (that) s 9 r (process) s 10 r (into) s 8 r (creating) s 9 r 97 c 9 r (viral) s 9 r (process,) s 10 r (which) s 9 r (would) s 8 r (then) s 1012 146 p (attempt) s 14 r (to) s 13 r (reproduce.) s 24 r (In) s 13 r (only) s 13 r (one) s 14 r (case,) s 16 r (the) s 13 r 174 c (nger) s 14 r (attack,) s 1012 196 p (was) s 11 r (the) s 11 r (daemon) s 11 r (process) s 11 r (actually) s 9 r (changed;) s 11 r (but) s 9 r (as) s 11 r (we) s 11 r (noted) s 1012 246 p (above) s 11 r (only) s 9 r (lysogenetic) s 10 r (viruses) s 10 r (actually) s 10 r (change) s 11 r (their) s 10 r (host') s -2 r 115 c 1012 295 p (genetic) s 11 r (material.) s 1054 348 p (Denning) s 12 r (de) s 174 c (nes) s 13 r 97 c 14 r (bacterium) s 13 r (as) s 13 r 97 c 14 r (program) s 12 r (which) s 13 r (repli-) s 1012 397 p (cates) s 9 r (itself) s 7 r (and) s 7 r (feeds) s 9 r (of) s 102 c 6 r (the) s 8 r (host') s -2 r 115 c 6 r (computational) s 6 r (resources.) s 1012 447 p (While) s 14 r (this) s 14 r (seems) s 15 r (to) s 14 r (describe) s 15 r (the) s 14 r (program) s 14 r (which) s 14 r (infected) s 1012 497 p (the) s 11 r (Internet,) s 10 r (it) s 10 r (is) s 11 r (an) s 11 r (awkward) s 11 r (and) s 11 r (vague) s 11 r (description) s 9 r (which) s 1012 547 p (doesn') s 116 c 9 r (seem) s 12 r (to) s 10 r (convey) s 10 r (the) s 10 r (nature) s 10 r (of) s 10 r (the) s 10 r (infection) s 9 r (at) s 10 r (all.) s 1054 599 p (Thus) s 10 r (we) s 10 r (have) s 11 r (chosen) s 10 r (to) s 9 r (call) s 10 r (the) s 10 r (program) s 9 r (which) s 10 r (infected) s 1012 649 p (the) s 11 r (Internet) s 9 r 97 c 11 r (virus.) s 13 r 87 c -2 r 101 c 10 r (feel) s 10 r (it) s 10 r (is) s 10 r (accurate) s 12 r (and) s 10 r (descriptive.) s t-bol.360 @sf 1012 780 p (1.3) s 51 r (Goals) s 18 r (and) s 19 r 84 c -4 r (argets) s t-rom.300 @sf 1012 862 p (The) s 15 r (program) s 14 r (that) s 14 r (attacked) s 15 r (many) s 14 r (Internet) s 14 r (hosts) s 14 r (was) s 14 r (itself) s 1012 912 p (attacked) s 10 r (by) s 9 r (teams) s 10 r (of) s 8 r (programmers) s 10 r (around) s 8 r (the) s 9 r (country) s -2 r 46 c 12 r (The) s 1012 962 p (goal) s 9 r (of) s 8 r (these) s 9 r (teams) s 9 r (was) s 9 r (to) s 8 r 174 c (nd) s 8 r (out) s t-ita.300 @sf 8 r (all) s t-rom.300 @sf 8 r (the) s 8 r (inner) s 8 r (workings) s 7 r (of) s 1012 1012 p (the) s 10 r (virus.) s 13 r (This) s 10 r (included) s 9 r (not) s 9 r (just) s 9 r (understanding) s 8 r (how) s 9 r (to) s 9 r (stop) s 1012 1062 p (further) s 9 r (attacks,) s 11 r (but) s 9 r (also) s 10 r (understanding) s 8 r (whether) s 10 r (any) s 10 r (perma-) s 1012 1111 p (nent) s 10 r (damage) s 11 r (had) s 11 r (been) s 10 r (done,) s 10 r (including) s 8 r (destruction) s 9 r (or) s 10 r (alter-) s 1012 1161 p (ation) s 11 r (of) s 11 r (data) s 11 r (during) s 10 r (the) s 11 r (actual) s 12 r (infection,) s 11 r (or) s 11 r (possible) s 10 r 96 c -2 r (`time) s 1012 1211 p (bombs') s -2 r 39 c 9 r (left) s 10 r (for) s 10 r (later) s 10 r (execution.) s 1054 1263 p (There) s 16 r (were) s 16 r (several) s 16 r (steps) s 15 r (in) s 15 r (achieving) s 15 r (these) s 15 r (goals:) s 23 r (in-) s 1012 1313 p (cluding) s cmsy10.300 @sf 1054 1365 p 15 c t-rom.300 @sf 20 r (isolating) s 7 r 97 c 8 r (specimen) s 9 r (of) s 7 r (the) s 8 r (virus) s 7 r (in) s 8 r 97 c 8 r (form) s 8 r (which) s 7 r (could) s 1095 1415 p (be) s 11 r (analyzed.) s cmsy10.300 @sf 1054 1465 p 15 c t-rom.300 @sf 20 r 96 c -2 r (`decompiling') s -4 r 39 c 15 r (the) s 16 r (virus,) s 17 r (into) s 16 r 97 c 16 r (form) s 17 r (that) s 16 r (could) s 15 r (be) s 1095 1515 p (shown) s 15 r (to) s 15 r (reduce) s 15 r (to) s 15 r (the) s 15 r (executable) s 16 r (of) s 14 r (the) s 15 r (real) s 16 r (thing,) s 1095 1564 p (so) s 11 r (that) s 9 r (the) s 11 r (higher) s 9 r (level) s 10 r (version) s 10 r (could) s 9 r (be) s 11 r (interpreted.) s cmsy10.300 @sf 1054 1614 p 15 c t-rom.300 @sf 20 r (analyzing) s 12 r (the) s 11 r (strategies) s 12 r (used) s 12 r (by) s 11 r (the) s 12 r (virus,) s 11 r (and) s 12 r (the) s 12 r (el-) s 1095 1664 p (ements) s 13 r (of) s 12 r (its) s 12 r (design,) s 12 r (in) s 12 r (order) s 12 r (to) s 12 r 174 c (nd) s 12 r (weaknesses) s 14 r (and) s 1095 1714 p (methods) s 11 r (of) s 10 r (defeating) s 9 r (it.) s 1054 1766 p (The) s 16 r 174 c (rst) s 15 r (two) s 14 r (steps) s 16 r (were) s 16 r (completed) s 15 r (by) s 15 r (the) s 15 r (morning) s 14 r (of) s 1012 1816 p 52 c 15 r (November) s 15 r (1988.) s 26 r (Enough) s 14 r (of) s 14 r (the) s 14 r (third) s 13 r (was) s 15 r (complete) s 15 r (to) s 1012 1866 p (determine) s 15 r (that) s 14 r (the) s 14 r (virus) s 14 r (was) s 15 r (harmless,) s 17 r (but) s 13 r (there) s 15 r (were) s 15 r (no) s 1012 1915 p (clues) s 14 r (to) s 12 r (the) s 12 r (higher) s 12 r (level) s 13 r (issues,) s 14 r (such) s 12 r (as) s 14 r (the) s 12 r (reason) s 14 r (for) s 12 r (the) s 1012 1965 p (virus') s 10 r (rapid) s 9 r (spread.) s 1054 2017 p (Once) s 12 r (the) s 11 r (decompiled) s 12 r (code) s 12 r (existed,) s 12 r (and) s 11 r (the) s 11 r (threat) s 12 r (of) s 11 r (the) s 1012 2067 p (virus) s 13 r (known) s 13 r (to) s 13 r (be) s 13 r (minimal,) s 15 r (it) s 12 r (was) s 15 r (clear) s 14 r (to) s 13 r (the) s 13 r (MIT) s 14 r (team) s 1012 2117 p (and) s 16 r (those) s 15 r (at) s 16 r (Berkeley) s 16 r (that) s 15 r (the) s 15 r (code) s 16 r (should) s 15 r (be) s 16 r (protected.) s 1012 2167 p 87 c -2 r 101 c 13 r (understood) s 13 r (that) s 12 r (the) s 14 r (knowledge) s 13 r (required) s 12 r (to) s 13 r (write) s 13 r (such) s 1012 2217 p 97 c 12 r (program) s 10 r (could) s 10 r (not) s 9 r (be) s 11 r (kept) s 10 r (secret,) s 12 r (but) s 10 r (felt) s 10 r (that) s 10 r (if) s 10 r (the) s 10 r (code) s 1012 2266 p (were) s 14 r (publicly) s 10 r (available,) s 14 r (someone) s 13 r (could) s 12 r (too) s 11 r (easily) s 13 r (modify) s 1012 2316 p (it) s 13 r (and) s 12 r (release) s 15 r 97 c 13 r (damaging) s 13 r (mutated) s 12 r (strain.) s 22 r (If) s 12 r (this) s 12 r (occurred) s 1012 2366 p (before) s 9 r (many) s 8 r (hosts) s 8 r (had) s 8 r (removed) s 8 r (the) s 8 r (bugs) s 8 r (which) s 7 r (allowed) s 8 r (the) s 1012 2416 p (penetration) s 9 r (in) s 9 r (the) s 9 r 174 c (rst) s 10 r (place,) s 10 r (much) s 10 r (damage) s 11 r (would) s 9 r (be) s 9 r (done.) s 1054 2468 p (There) s 11 r (was) s 11 r (also) s 10 r 97 c 10 r (clear) s 11 r (need) s 10 r (to) s 10 r (explain) s 9 r (to) s 9 r (the) s 10 r (community) s 1012 2518 p (what) s 9 r (the) s 9 r (virus) s 8 r (was) s 9 r (and) s 9 r (how) s 9 r (it) s 8 r (worked.) s 13 r (This) s 9 r (information,) s 7 r (in) s 1012 2568 p (the) s 10 r (form) s 9 r (of) s 9 r (this) s 8 r (report,) s 9 r (can) s 10 r (actually) s 9 r (be) s t-ita.300 @sf 10 r (mor) s -1 r 101 c t-rom.300 @sf 9 r (useful) s 9 r (to) s 9 r (inter-) s 1012 2617 p (ested) s 9 r (people) s 8 r (than) s 7 r (the) s 8 r (source) s 9 r (code) s 8 r (could) s 7 r (be,) s 9 r (since) s 9 r (it) s 7 r (includes) s 1012 2667 p (discussion) s 8 r (of) s 8 r (the) s 8 r (side) s 8 r (ef) s (fects) s 8 r (and) s 8 r (results) s 8 r (of) s 8 r (the) s 8 r (code,) s 9 r (as) s 9 r (well) s 1012 2717 p (as) s 9 r 175 c (aws) s 8 r (in) s 7 r (it,) s 8 r (rather) s 8 r (than) s 7 r (merely) s 8 r (listing) s 6 r (the) s 7 r (code) s 8 r (line) s 7 r (by) s 8 r (line.) s 965 2842 p 50 c @eop 3 @bop0 /Courier /c-med.300 ReEncodeForTeX /c-med.300 /c-med.300 41.511000 TeXPSmakefont def cmr7.300 @sf [<FFE0FFE07FE0307018300C300E000700038001C001E000F000F070F0F8F0F9E0FBE07FC01F00> 12 19 -2 0 17] 50 @dc cmr6.300 @sf [<FFC0FFC07FC0306018600E000700038001C001E000E0E0E0E1E0C3C07F801F00> 11 16 -1 0 15] 50 @dc 3 @bop1 t-rom.300 @sf -36 96 p (Conv) s -1 r (ersely) s -2 r 44 c 6 r (there) s 8 r (are) s 8 r (people) s 7 r (interested) s 7 r (in) s 7 r (the) s 8 r (intricate) s 6 r (detail) s -36 146 p (of) s 7 r (how) s 8 r (and) s 9 r (why) s 9 r (certain) s 9 r (routines) s 7 r (were) s 10 r (used;) s 9 r (there) s 9 r (should) s 7 r (be) s -36 196 p (enough) s 6 r (detail) s 7 r (here) s 8 r (to) s 7 r (satisfy) s 7 r (them) s 8 r (as) s 9 r (well.) s 13 r (Readers) s 8 r (will) s 7 r (also) s -36 246 p 174 c (nd) s 8 r (Seely[) s 56 c 93 c 10 r (and) s 11 r (Spaf) s (ford') s -2 r (s[) s 57 c -2 r 93 c 10 r (papers) s 10 r (interesting.) s t-bol.360 @sf -36 369 p (1.4) s 49 r (Major) s 18 r (Points) s t-rom.300 @sf -36 448 p (This) s 13 r (section) s 15 r (provides) s 14 r (an) s 16 r (outline) s 13 r (of) s 15 r (the) s 15 r (how) s 15 r (the) s 14 r (virus) s 15 r (at-) s -36 498 p (tacked) s 11 r (and) s 13 r (who) s 12 r (it) s 12 r (attacked.) s 21 r (It) s 12 r (also) s 13 r (lists) s 11 r (several) s 14 r (things) s 11 r (the) s -36 548 p (viru) s -1 r 115 c 11 r (did) s 11 r (not) s 12 r (do,) s 13 r (but) s 11 r (which) s 12 r (many) s 12 r (people) s 13 r (seem) s 13 r (to) s 12 r (have) s 13 r (at-) s -36 598 p (trib) s -1 r (ut) s -1 r (ed) s 14 r (to) s 14 r (the) s 15 r (virus.) s 28 r (All) s 14 r (of) s 15 r (the) s 14 r (following) s 13 r (points) s 14 r (are) s 15 r (de-) s -36 648 p (scribed) s 9 r (in) s 9 r (more) s 11 r (detail) s 10 r (in) s 9 r (Section) s 10 r (2.) s t-bol.300 @sf -36 763 p (1.4.1) s 40 r (How) s 16 r (it) s 15 r (enter) s (ed) s cmsy10.300 @sf 4 841 p 15 c t-rom.300 @sf 21 r (sendmail) s 8 r (\(needed) s 9 r (debug) s 8 r (mode,) s 10 r (as) s 9 r (in) s 8 r (SunOS) s 9 r (binary) s 7 r (re-) s 46 891 p (leases\)) s cmsy10.300 @sf 4 941 p 15 c 21 r t-rom.300 @sf 174 c (nger[) s (10) s -1 r 93 c 10 r (\(only) s 9 r 86 c -4 r (AX) s 9 r (hosts) s 10 r (were) s 11 r (victims\)) s cmsy10.300 @sf 4 991 p 15 c t-rom.300 @sf 21 r (remote) s 10 r (execution) s 10 r (system,) s 11 r (using) s cmsy10.300 @sf 95 1040 p 15 c t-rom.300 @sf 21 r (rexec) s cmsy10.300 @sf 95 1090 p 15 c t-rom.300 @sf 21 r (rsh) s t-bol.300 @sf -36 1205 p (1.4.2) s 40 r (Who) s 15 r (it) s 16 r (attacked) s cmsy10.300 @sf 4 1284 p 15 c t-rom.300 @sf 21 r (accounts) s 10 r (with) s 9 r (obvious) s 9 r (passwords,) s 11 r (such) s 10 r (as) s cmsy10.300 @sf 95 1334 p 15 c t-rom.300 @sf 21 r (none) s 10 r (at) s 10 r (all) s cmsy10.300 @sf 95 1383 p 15 c t-rom.300 @sf 21 r (the) s 10 r (user) s 10 r (name) s cmsy10.300 @sf 95 1433 p 15 c t-rom.300 @sf 21 r (the) s 10 r (user) s 10 r (name) s 12 r (appended) s 10 r (to) s 10 r (itself) s cmsy10.300 @sf 95 1483 p 15 c t-rom.300 @sf 21 r (the) s 10 r 96 c -2 r (`nickname') s -2 r 39 c cmsy10.300 @sf 95 1533 p 15 c t-rom.300 @sf 21 r (the) s 10 r (last) s 10 r (name) s cmsy10.300 @sf 95 1583 p 15 c t-rom.300 @sf 21 r (the) s 10 r (last) s 10 r (name) s 11 r (spelled) s 10 r (backwards) s cmsy10.300 @sf 4 1632 p 15 c t-rom.300 @sf 21 r (accounts) s 8 r (with) s 7 r (passwords) s 8 r (in) s 8 r 97 c 9 r (432) s 7 r (word) s 8 r (dictionary) s 7 r (\(see) s 46 1682 p (Appendix) s 9 r (B\)) s cmsy10.300 @sf 4 1732 p 15 c t-rom.300 @sf 21 r (accounts) s 10 r (with) s 9 r (passwords) s 11 r (in) s c-med.300 @sf 9 r (/usr/dict/words) s cmsy10.300 @sf 4 1782 p 15 c t-rom.300 @sf 21 r (accounts) s 31 r (which) s 31 r (trusted) s 31 r (other) s 30 r (machines) s 33 r (via) s 31 r (the) s c-med.300 @sf 46 1832 p (.rhosts) s t-rom.300 @sf 9 r (mechanism) s t-bol.300 @sf -36 1947 p (1.4.3) s 40 r (What) s 15 r (it) s 15 r (attacked) s cmsy10.300 @sf 4 2025 p 15 c t-rom.300 @sf 21 r (SUNs) s 10 r (and) s 10 r 86 c -4 r (AXes) s 10 r (only) s cmsy10.300 @sf 4 2075 p 15 c t-rom.300 @sf 21 r (machines) s 11 r (in) s c-med.300 @sf 9 r (/etc/hosts.equiv) s cmsy10.300 @sf 4 2125 p 15 c t-rom.300 @sf 21 r (machines) s 11 r (in) s c-med.300 @sf 9 r (/.rhosts) s cmsy10.300 @sf 4 2175 p 15 c t-rom.300 @sf 21 r (machines) s 11 r (in) s 9 r (cracked) s 12 r (accounts') s c-med.300 @sf 10 r (.forward) s 10 r t-rom.300 @sf 174 c (les) s cmsy10.300 @sf 4 2225 p 15 c t-rom.300 @sf 21 r (machines) s 11 r (in) s 9 r (cracked) s 12 r (accounts') s c-med.300 @sf 10 r (.rhosts) s 10 r t-rom.300 @sf 174 c (les) s cmsy10.300 @sf 4 2274 p 15 c t-rom.300 @sf 21 r (machines) s 10 r (listed) s 10 r (as) s 10 r (network) s 9 r (gateways) s 11 r (in) s 10 r (routing) s 8 r (tables) s cmsy10.300 @sf 4 2324 p 15 c t-rom.300 @sf 21 r (machines) s 11 r (at) s 10 r (the) s 10 r (far) s 11 r (end) s 10 r (of) s 10 r (point-to) s -1 r (-poi) s -1 r (nt) s 8 r (interfaces) s cmsy10.300 @sf 4 2374 p 15 c t-rom.300 @sf 21 r (possibly) s 11 r (machines) s 13 r (at) s 13 r (randomly) s 11 r (guessed) s 13 r (addresses) s 14 r (on) s 46 2424 p (networks) s 9 r (of) s 10 r 174 c (rst) s 10 r (hop) s 10 r (gateways) s t-bol.300 @sf -36 2539 p (1.4.4) s 40 r (What) s 15 r (it) s 15 r (did) s 16 r (NOT) s 16 r (do) s cmsy10.300 @sf 4 2617 p 15 c t-rom.300 @sf 21 r (gain) s 17 r (privileged) s 17 r (access) s 20 r (\(it) s 17 r (almost) s 18 r (never) s 18 r (broke) s 17 r (in) s 18 r (as) s c-med.300 @sf 46 2667 p (root) s t-rom.300 @sf 41 c cmsy10.300 @sf 4 2717 p 15 c t-rom.300 @sf 21 r (destroy) s 9 r (or) s 10 r (attempt) s 10 r (to) s 10 r (destroy) s 9 r (any) s 11 r (data) s cmsy10.300 @sf 1054 96 p 15 c t-rom.300 @sf 20 r (leave) s 11 r (time) s 11 r (bombs) s 10 r (behind) s cmsy10.300 @sf 1054 146 p 15 c t-rom.300 @sf 20 r (dif) s (ferentiate) s 26 r (among) s 27 r (networks) s 26 r (\(such) s 28 r (as) s 27 r (MILNET) s -2 r 44 c 1095 196 p (ARP) s -3 r (ANET\)) s cmsy10.300 @sf 1054 246 p 15 c t-rom.300 @sf 20 r (use) s 11 r (UUCP) s 10 r (at) s 11 r (all) s cmsy10.300 @sf 1054 295 p 15 c t-rom.300 @sf 20 r (attack) s 8 r (speci) s 174 c 99 c 8 r (well-known) s 5 r (or) s 7 r (privileged) s 6 r (accounts) s 7 r (such) s 1095 345 p (as) s c-med.300 @sf 11 r (root) s t-bol.420 @sf 1012 490 p 50 c 59 r (Strategies) s t-bol.360 @sf 1012 592 p (2.1) s 51 r (Attacks) s t-rom.300 @sf 1012 671 p (This) s 9 r (virus) s 7 r (attacked) s 8 r (several) s 9 r (things,) s 8 r (directly) s 7 r (and) s 8 r (indirectly) s -2 r 46 c 11 r (It) s 1012 721 p (picked) s 8 r (out) s 8 r (some) s 8 r (deliberate) s 8 r (tar) s (gets,) s 8 r (such) s 9 r (as) s 8 r (speci) s 174 c 99 c 9 r (network) s 1012 771 p (daemons) s 16 r (through) s 12 r (which) s 14 r (to) s 14 r (infect) s 14 r (the) s 14 r (remote) s 15 r (host.) s 26 r (There) s 1012 821 p (were) s 15 r (also) s 13 r (less) s 14 r (direct) s 14 r (tar) s (gets,) s 13 r (such) s 14 r (as) s 14 r (mail) s 14 r (service) s 14 r (and) s 14 r (the) s 1012 871 p 175 c (ow) s 11 r (of) s 10 r (information) s 8 r (about) s 10 r (the) s 10 r (virus.) s t-bol.300 @sf 1012 985 p (2.1.1) s 42 r (Sendmail) s 15 r (Debug) s 16 r (Mode) s t-rom.300 @sf 1012 1065 p (The) s 14 r (virus) s 11 r (exploited) s 12 r (the) s 12 r 96 c -2 r (`debug') s -3 r 39 c 10 r (function) s 12 r (of) s c-med.300 @sf 12 r (sendmail) s t-rom.300 @sf 44 c 1012 1114 p (which) s 10 r (enables) s 11 r (debugging) s 8 r (mode) s 11 r (for) s 9 r (the) s 10 r (duration) s 9 r (of) s 10 r (the) s 10 r (cur-) s 1012 1164 p (rent) s 14 r (connection.) s 23 r (Debugging) s 12 r (mode) s 13 r (has) s 14 r (many) s 14 r (features,) s 15 r (in-) s 1012 1214 p (cluding) s 11 r (the) s 12 r (ability) s 10 r (to) s 11 r (send) s 12 r 97 c 12 r (mail) s 12 r (message) s 14 r (with) s 10 r 97 c 13 r (program) s 1012 1264 p (as) s 12 r (the) s 11 r (recipient) s 11 r (\(i.e.) s 17 r (the) s 11 r (program) s 11 r (would) s 10 r (run,) s 11 r (with) s 11 r (all) s 10 r (of) s 11 r (its) s 1012 1314 p (input) s 10 r (coming) s 10 r (from) s 11 r (the) s 10 r (body) s 10 r (of) s 11 r (the) s 11 r (message\).) s 17 r (This) s 11 r (is) s 10 r (inap-) s 1012 1363 p (propriate) s 10 r (and) s 11 r (rumor[) s 49 c -1 r 49 c -2 r 93 c 10 r (has) s 11 r (it) s 10 r (that) s 10 r (the) s 10 r (author) s 10 r (included) s 9 r (this) s 1012 1413 p (feature) s 14 r (to) s 13 r (allow) s 12 r (him) s 13 r (to) s 13 r (circumvent) s 13 r (security) s 12 r (on) s 13 r 97 c 14 r (machine) s 1012 1463 p (he) s 13 r (was) s 12 r (using) s 12 r (for) s 11 r (testing.) s 18 r (It) s 12 r (certainly) s 11 r (exceeds) s 14 r (the) s 11 r (intended) s 1012 1513 p (design) s 10 r (of) s 10 r (the) s 10 r (Simple) s 10 r (Mail) s 10 r 84 c (ransfer) s 10 r (Protocol) s 9 r (\(SMTP\)) s 10 r 91 c (12) s -1 r (].) s 1054 1564 p (Speci) s 174 c (cation) s 14 r (of) s 13 r 97 c 15 r (program) s 14 r (to) s 13 r (execute) s 15 r (when) s 14 r (mail) s 14 r (is) s 13 r (re-) s 1012 1613 p (ceived) s 15 r (is) s 13 r (normally) s 13 r (allowed) s 14 r (in) s 13 r (the) s c-med.300 @sf 14 r (sendmail) s t-rom.300 @sf 13 r (aliases) s 14 r 174 c (le) s 1012 1663 p (or) s 11 r (users') s c-med.300 @sf 11 r (.forward) s 10 r t-rom.300 @sf 174 c (les) s 11 r (directly) s -2 r 44 c 10 r (for) s c-med.300 @sf 10 r (vacation) s cmr7.300 @sf 1874 1649 p 50 c t-rom.300 @sf 1892 1663 p 44 c 12 r (mail) s 1012 1713 p (archive) s 13 r (programs,) s 12 r (and) s 12 r (personal) s 12 r (mail) s 12 r (sorters.) s 18 r (It) s 12 r (is) s t-ita.300 @sf 11 r (not) s t-rom.300 @sf 11 r (nor-) s 1012 1763 p (mally) s 12 r (allowed) s 12 r (for) s 12 r (incoming) s 11 r (connections.) s 19 r (In) s 12 r (the) s 12 r (virus,) s 12 r (the) s 1012 1813 p 96 c -2 r (`recipient') s -3 r 39 c 12 r (was) s 15 r 97 c 15 r (command) s 15 r (to) s 13 r (strip) s 14 r (of) s 102 c 13 r (the) s 14 r (mail) s 14 r (headers) s 1012 1862 p (and) s 14 r (pass) s 15 r (the) s 13 r (remainder) s 14 r (of) s 14 r (the) s 13 r (message) s 15 r (to) s 14 r 97 c 14 r (command) s 14 r (in-) s 1012 1912 p (terpreter) s -1 r 46 c 17 r (The) s 13 r (body) s 10 r (was) s 13 r 97 c 12 r (script) s 11 r (that) s 11 r (created) s 13 r 97 c 12 r 67 c 11 r (program,) s 1012 1962 p (the) s 8 r 96 c -2 r (`grappli) s -1 r (ng) s 6 r (hook,') s -2 r 39 c 6 r (which) s 7 r (transfered) s 8 r (the) s 8 r (rest) s 8 r (of) s 7 r (the) s 8 r (mod-) s 1012 2012 p (ules) s 13 r (from) s 13 r (the) s 12 r (originiati) s -1 r (ng) s 11 r (host,) s 13 r (and) s 13 r (the) s 12 r (commands) s 14 r (to) s 12 r (link) s 1012 2062 p (and) s 11 r (execute) s 11 r (them.) s 15 r (Both) s 9 r 86 c -4 r (AX) s 9 r (and) s 11 r (Sun) s 10 r (binaries) s 10 r (were) s 11 r (trans-) s 1012 2111 p (fered) s 13 r (and) s 12 r (both) s 10 r (would) s 11 r (be) s 12 r (tried) s 11 r (in) s 12 r (turn,) s 11 r (no) s 12 r (attempt) s 11 r (to) s 12 r (deter-) s 1012 2161 p (mine) s 14 r (the) s 13 r (machine) s 14 r (type) s 13 r (was) s 14 r (made.) s 24 r (On) s 13 r (other) s 12 r (architectures) s 1012 2211 p (the) s 9 r (programs) s 10 r (would) s 8 r (not) s 8 r (run,) s 9 r (but) s 8 r (would) s 9 r (use) s 9 r (resources) s 10 r (in) s 9 r (the) s 1012 2261 p (linking) s 7 r (process.) s 14 r (All) s 7 r (other) s 8 r (attacks) s 9 r (used) s 9 r (the) s 8 r (same) s 10 r 96 c -2 r (`grappl) s -1 r (ing) s 1012 2311 p (hook') s -2 r 39 c 7 r (mechanism,) s 10 r (but) s 8 r (used) s 9 r (other) s 8 r 175 c (aws) s 9 r (to) s 8 r (inject) s 8 r (the) s 8 r 96 c -2 r (`grap-) s 1012 2361 p (pling) s 9 r (hook') s -2 r 39 c 8 r (into) s 9 r (the) s 10 r (tar) s (get) s 9 r (machine.) s 1054 2411 p (The) s 10 r (fact) s 11 r (that) s 9 r (debug) s 9 r (was) s 11 r (enabled) s 10 r (by) s 9 r (default) s 10 r (was) s 10 r (reported) s 1012 2461 p (to) s 11 r (Berkeley) s 12 r (by) s 11 r (several) s 12 r (sources) s 12 r (during) s 10 r (the) s 11 r (4.2BSD) s 11 r (release.) s 1012 2511 p (The) s 15 r (4.3BSD) s 14 r (release) s 16 r (as) s 15 r (well) s 14 r (as) s 15 r (Sun) s 14 r (releases) s 15 r (still) s 13 r (had) s 14 r (this) s 1012 2561 p (option) s 9 r (enabled) s 11 r (by) s 10 r (default) s 10 r 91 c (13) s -1 r (].) s 15 r (The) s 12 r (then) s 10 r (current) s 10 r (release) s 12 r (of) s 1012 2600 p 390 2 ru cmr6.300 @sf 1055 2627 p 50 c t-rom.240 @sf 1072 2638 p 65 c 10 r (program) s 8 r (which) s 9 r (accepts) s 8 r (incoming) s 8 r (mail) s 10 r (and) s 8 r (sends) s 9 r (back) s 8 r (mail) s 9 r (to) s 10 r (the) s 1012 2678 p (original) s 7 r (sender) s 44 c 5 r (usually) s 7 r (saying) s 6 r (something) s 6 r (like) s 7 r 96 c -1 r (`I) s 6 r (am) s 7 r (on) s 7 r (vacation,) s 6 r (and) s 7 r (will) s 1012 2717 p (not) s 8 r (read) s 8 r (your) s 7 r (mail) s 8 r (until) s 8 r 73 c 9 r (return.') s -1 r 39 c t-rom.300 @sf 965 2842 p 51 c @eop 4 @bop0 cmr7.300 @sf [<1FC03FF07078F838F83CF83C703C003800700FC00FC000F0007038787878787838703FE00FC0> 14 19 -1 0 17] 51 @dc cmr6.300 @sf [<3F007F80E1C0E1E041E001E001C003C00F000F80038023C073C073C03F801F00> 11 16 -1 0 15] 51 @dc cmr7.300 @sf [<07FC07FC00E000E000E000E0FFFCFFFCE0E070E030E018E01CE00EE007E003E001E001E000E0> 14 19 -1 0 17] 52 @dc cmr6.300 @sf [<1FE01FE0038003800380FFE0FFE0E380738033801B801F800F80078007800380> 11 16 -1 0 15] 52 @dc 4 @bop1 t-rom.300 @sf -36 96 p (Ultr) s -1 r (ix) s 10 r (did) s 12 r (not) s 12 r (have) s 13 r (debug) s 12 r (mode) s 13 r (enabled,) s 14 r (but) s 12 r (the) s 12 r (beta) s 13 r (test) s -36 146 p (version) s 13 r (of) s 15 r (the) s 15 r (newest) s 16 r (release) s 16 r (did) s 15 r (have) s 15 r (debug) s 15 r (enabled) s 16 r (\(it) s -36 196 p (was) s 11 r (disabled) s 12 r (before) s 12 r 174 c (nally) s 12 r (being) s 11 r (shipped\).) s 19 r (MIT') s -1 r 115 c 11 r (Project) s -36 246 p (Athena) s 14 r (was) s 16 r (among) s 15 r 97 c 16 r (number) s 15 r (of) s 15 r (sites) s 15 r (which) s 15 r (went) s 15 r (out) s 15 r (of) s -36 295 p (its) s 9 r (way) s 11 r (to) s 10 r (disable) s 11 r (debug) s 10 r (mode;) s 11 r (however) s -1 r 44 c 11 r (it) s 10 r (is) s 11 r (unlikely) s 9 r (that) s -36 345 p (many) s 9 r (binary-only) s 8 r (sites) s 10 r (were) s 11 r (able) s 11 r (to) s 10 r (be) s 10 r (as) s 11 r (diligent.) s t-bol.300 @sf -36 483 p (2.1.2) s 40 r (Finger) s 17 r (Daemon) s 15 r (Bug) s t-rom.300 @sf -36 570 p (The) s 12 r (virus) s 11 r (hit) s 11 r (the) s 12 r 174 c (nger) s 13 r (daemon) s 13 r 40 c c-med.300 @sf (fingerd) s t-rom.300 @sf 41 c 11 r (by) s 12 r (over) s 175 c (ow-) s -36 620 p (ing) s 11 r 97 c 14 r (buf) s (fer) s 13 r (which) s 13 r (was) s 14 r (allocated) s 14 r (on) s 13 r (the) s 13 r (stack.) s 25 r (The) s 14 r (over-) s -36 670 p 175 c (ow) s 11 r (was) s 13 r (possible) s 12 r (because) s c-med.300 @sf 14 r (fingerd) s t-rom.300 @sf 12 r (used) s 13 r 97 c 13 r (library) s 12 r (func-) s -36 720 p (tio) s -1 r 110 c 8 r (which) s 9 r (did) s 9 r (not) s 8 r (do) s 10 r (range) s 9 r (checking.) s 14 r (Since) s 10 r (the) s 10 r (buf) s (fer) s 8 r (was) s -36 770 p (on) s 13 r (the) s 15 r (stack,) s 17 r (the) s 15 r (over) s 175 c (ow) s 15 r (allowed) s 14 r 97 c 16 r (fake) s 16 r (stack) s 15 r (frame) s 16 r (to) s -36 819 p (be) s 11 r (created,) s 15 r (which) s 12 r (caused) s 13 r 97 c 13 r (small) s 13 r (piece) s 13 r (of) s 12 r (code) s 13 r (to) s 12 r (be) s 13 r (exe-) s -36 869 p (cuted) s 10 r (when) s 11 r (the) s 12 r (procedure) s 11 r (returned) s cmr7.300 @sf 555 855 p 51 c t-rom.300 @sf 573 869 p 46 c 18 r (The) s 12 r (library) s 10 r (function) s -36 919 p (in) s 12 r (question) s 12 r (turns) s 13 r (out) s 13 r (to) s 13 r (be) s 14 r 97 c 14 r (backward-compatibility) s 11 r (rou-) s -36 969 p (tin) s -1 r (e,) s 10 r (which) s 9 r (should) s 9 r (not) s 10 r (have) s 11 r (been) s 10 r (needed) s 11 r (after) s 11 r (1979) s 9 r 91 c (14) s -1 r (].) s 4 1024 p (Only) s 16 r (4.3BSD) s 17 r 86 c -4 r (AX) s 16 r (machines) s 18 r (were) s 18 r (attacked) s 17 r (this) s 17 r (way) s -2 r 46 c -36 1074 p (The) s 14 r (virus) s 14 r (did) s 14 r (not) s 14 r (attempt) s 14 r 97 c 16 r (Sun) s 14 r (speci) s 174 c 99 c 16 r (attack) s 15 r (on) s 15 r 174 c (nger) s -36 1123 p (and) s 13 r (its) s 14 r 86 c -4 r (AX) s 13 r (attack) s 14 r (failed) s 15 r (when) s 14 r (invoked) s 13 r (on) s 14 r 97 c 15 r (Sun) s 14 r (tar) s (get.) s -36 1173 p (Ultr) s -1 r (ix) s 9 r (was) s 13 r (not) s 11 r (vulnerable) s 11 r (to) s 11 r (this) s 10 r (since) s 12 r (production) s 10 r (releases) s -36 1223 p (did) s 8 r (not) s 9 r (include) s 10 r 97 c c-med.300 @sf 11 r (fingerd) s t-rom.300 @sf 46 c t-bol.300 @sf -36 1361 p (2.1.3) s 40 r (Rexec) s 17 r (and) s 16 r (Passwords) s t-rom.300 @sf -36 1448 p (The) s 16 r (virus) s 17 r (attacked) s 18 r (using) s 16 r (the) s 17 r (Berkeley) s 17 r (remote) s 18 r (execution) s -36 1498 p (prot) s -1 r (ocol,) s 9 r (which) s 10 r (required) s 10 r (the) s 11 r (user) s 11 r (name) s 11 r (and) s 11 r (plaintext) s 9 r (pass-) s -36 1548 p (word) s 5 r (to) s 7 r (be) s 7 r (passed) s 8 r (over) s 7 r (the) s 7 r (net.) s 13 r (The) s 8 r (program) s 7 r (only) s 6 r (used) s 8 r (pairs) s -36 1598 p (of) s 12 r (user) s 15 r (names) s 15 r (and) s 14 r (passwords) s 15 r (which) s 14 r (it) s 13 r (had) s 14 r (already) s 15 r (tested) s -36 1647 p (and) s 7 r (found) s 7 r (to) s 7 r (be) s 9 r (correct) s 8 r (on) s 8 r (the) s 8 r (local) s 8 r (host.) s 13 r 65 c 8 r (common,) s 10 r (world) s -36 1697 p (readable) s 7 r 174 c (le) s 7 r 40 c c-med.300 @sf (/etc/passwd) s t-rom.300 @sf 41 c 7 r (that) s 6 r (contains) s 7 r (the) s 8 r (user) s 7 r (names) s -36 1747 p (and) s 11 r (encrypted) s 13 r (passwords) s 12 r (for) s 13 r (every) s 13 r (user) s 12 r (on) s 13 r (the) s 12 r (system) s 13 r (fa-) s -36 1797 p (cilit) s -1 r (ated) s 9 r (this) s 9 r (search.) s 15 r (Speci) s 174 c (cally:) s cmsy10.300 @sf 4 1852 p 15 c t-rom.300 @sf 21 r (this) s 9 r 174 c (le) s 10 r (was) s 10 r (an) s 11 r (easy-to-obtain) s 8 r (list) s 9 r (of) s 10 r (user) s 10 r (names) s 11 r (to) s 10 r (at-) s 46 1902 p (tack,) s cmsy10.300 @sf 4 1951 p 15 c t-rom.300 @sf 21 r (the) s 11 r (dictionary) s 10 r (attack) s 12 r (was) s 12 r 97 c 13 r (method) s 11 r (of) s 11 r (verifying) s 10 r (pass-) s 46 2001 p (word) s 15 r (guesses) s 16 r (which) s 15 r (would) s 15 r (not) s 15 r (be) s 16 r (noted) s 15 r (in) s 15 r (security) s 46 2051 p (logs.) s -36 2106 p (The) s 14 r (principle) s 13 r (of) s 14 r 96 c -2 r (`least) s 14 r (privilege') s -3 r 39 c 13 r 91 c (15) s -1 r 93 c 15 r (is) s 14 r (violated) s 14 r (by) s 14 r (the) s -36 2156 p (existence) s 11 r (of) s 12 r (this) s 11 r (password) s 12 r 174 c (le.) s 20 r 84 c -2 r (ypical) s 11 r (programs) s 12 r (have) s 13 r (no) s -36 2205 p (need) s 11 r (for) s 12 r 97 c 12 r (list) s 11 r (of) s 12 r (user) s 12 r (names) s 14 r (and) s 12 r (password) s 12 r (strings,) s 11 r (so) s 12 r (this) s -36 2255 p (priv) s -1 r (il) s -1 r (eged) s 8 r (information) s 6 r (should) s 8 r (not) s 8 r (be) s 9 r (available) s 8 r (to) s 8 r (them.) s 14 r (For) s -36 2305 p (example,) s 12 r (Project) s 12 r (Athena') s -1 r 115 c 11 r (network) s 11 r (authentication) s 11 r (system,) s t-ita.300 @sf -36 2355 p (Kerber) s -1 r (os) s t-rom.300 @sf 11 r 91 c (16) s -1 r (],) s 13 r (keeps) s 13 r (passwords) s 12 r (on) s 12 r 97 c 13 r (central) s 12 r (server) s 13 r (which) s -36 2405 p (logs) s 14 r (authentication) s 14 r (requests,) s 18 r (thus) s 15 r (hiding) s 14 r (the) s 16 r (list) s 15 r (of) s 15 r (valid) s -36 2454 p (user) s 12 r (names.) s 24 r (However) s -1 r 44 c 14 r (once) s 14 r 97 c 14 r (name) s 14 r (is) s 13 r (found,) s 14 r (the) s 13 r (authen-) s -36 2504 p (ticatio) s -1 r 110 c 8 r 96 c -2 r (`ticket') s -3 r 39 c 8 r (is) s 10 r (still) s 9 r (vulnerable) s 10 r (to) s 9 r (dictionary) s 9 r (attack.) s -36 2560 p 390 2 ru cmr6.300 @sf 5 2588 p 51 c t-rom.240 @sf 22 2599 p (MIT') s -1 r 115 c 5 r (Project) s 7 r (Athena) s 5 r (has) s 5 r 97 c 6 r 96 c -1 r (`write') s -1 r 39 c 4 r (daemon) s 4 r (which) s 6 r (has) s 5 r 97 c 6 r (similar) s 6 r (piece) s -36 2638 p (of) s 7 r (code) s 5 r (with) s 7 r (the) s 8 r (same) s 6 r 175 c (aw) s 8 r (but) s 7 r (it) s 8 r (explicitly) s 7 r (exits) s 7 r (rather) s 7 r (than) s 7 r (returning,) s 7 r (and) s -36 2678 p (thus) s 6 r (never) s 7 r (uses) s 8 r (the) s 8 r (\(damaged\)) s 6 r (return) s 8 r (stack.) s 11 r 65 c 8 r (comment) s 7 r (in) s 8 r (the) s 8 r (code) s 7 r (notes) s -36 2717 p (that) s 7 r (it) s 8 r (is) s 9 r (mostly) s 8 r (copied) s 6 r (from) s 8 r (the) s 8 r 174 c (nger) s 8 r (daemon.) s t-bol.300 @sf 1012 96 p (2.1.4) s 42 r (Rsh) s 16 r (and) s 16 r 84 c -2 r (rust) s t-rom.300 @sf 1012 192 p (The) s 14 r (virus) s 11 r (attempted) s 12 r (to) s 12 r (use) s 13 r (the) s 12 r (Berkeley) s 13 r (remote) s 12 r (shell) s 12 r (pro-) s 1012 241 p (gram) s 13 r (\(called) s c-med.300 @sf 12 r (rsh) s t-rom.300 @sf 41 c 12 r (to) s 11 r (attack) s 13 r (other) s 11 r (machines) s 13 r (without) s 11 r (using) s 1012 291 p (passwords.) s 25 r (The) s 14 r (remote) s 14 r (shell) s 13 r (utility) s 11 r (is) s 14 r (similar) s 13 r (in) s 13 r (function) s 1012 341 p (to) s 11 r (the) s 11 r (remote) s 11 r (execution) s 10 r (system,) s 12 r (although) s 9 r (it) s 11 r (is) s 10 r 96 c -2 r (`friendli) s -1 r (er) s 2 r 39 c -3 r 39 c 1012 391 p (since) s 10 r (the) s 10 r (remote) s 10 r (end) s 9 r (of) s 10 r (the) s 9 r (connection) s 9 r (is) s 9 r 97 c 10 r (command) s 11 r (inter-) s 1012 441 p (preter) s -1 r 44 c 10 r (instead) s 10 r (of) s 10 r (the) s t-ita.300 @sf 11 r (exec) s t-rom.300 @sf 12 r (function.) s 12 r (For) s 10 r (convenience,) s 12 r 97 c 10 r 174 c (le) s c-med.300 @sf 1012 490 p (/etc/hosts.equiv) s t-rom.300 @sf 12 r (can) s 15 r (contain) s 12 r 97 c 14 r (list) s 13 r (of) s 13 r (hosts) s 12 r (trusted) s 1012 540 p (by) s 11 r (this) s 10 r (host.) s 15 r (The) s c-med.300 @sf 11 r (.rhosts) s 10 r t-rom.300 @sf 174 c (le) s 11 r (provides) s 10 r (similar) s 10 r (function-) s 1012 590 p (ality) s 9 r (on) s 10 r 97 c 11 r (per) s (-user) s 9 r (basis.) s 14 r (The) s 11 r (remote) s 10 r (host) s 9 r (can) s 11 r (pass) s 10 r (the) s 10 r (user) s 1012 640 p (name) s 15 r (from) s 14 r 97 c 15 r (trusted) s 13 r (port) s 13 r (\(one) s 13 r (which) s 14 r (can) s 15 r (only) s 12 r (be) s 15 r (opened) s 1012 690 p (by) s c-med.300 @sf 10 r (root) s t-rom.300 @sf 41 c 10 r (and) s 10 r (the) s 10 r (local) s 9 r (host) s 10 r (will) s 8 r (trust) s 9 r (that) s 10 r (as) s 10 r (proof) s 9 r (that) s 10 r (the) s 1012 739 p (connection) s 10 r (is) s 10 r (being) s 10 r (made) s 11 r (for) s 10 r (the) s 10 r (named) s 11 r (user) s -1 r 46 c 1054 799 p (This) s 12 r (system) s 12 r (has) s 13 r (an) s 12 r (important) s 11 r (design) s 11 r 175 c (aw) s -2 r 44 c 13 r (which) s 11 r (is) s 12 r (that) s 1012 848 p (the) s 14 r (local) s 14 r (host) s 13 r (only) s 13 r (knows) s 13 r (the) s 14 r (remote) s 14 r (host) s 14 r (by) s 13 r (its) s 13 r (network) s 1012 898 p (address,) s 15 r (which) s 13 r (can) s 14 r (often) s 12 r (be) s 13 r (for) s (ged.) s 21 r (It) s 13 r (also) s 13 r (trusts) s 12 r (the) s 13 r (ma-) s 1012 948 p (chine,) s 13 r (rather) s 12 r (than) s 11 r (any) s 12 r (property) s 10 r (of) s 12 r (the) s 11 r (user) s -1 r 44 c 12 r (leaving) s 11 r (the) s 12 r (ac-) s 1012 998 p (count) s 12 r (open) s 11 r (to) s 11 r (attack) s 13 r (at) s 11 r (all) s 12 r (times) s 12 r (rather) s 11 r (than) s 12 r (when) s 12 r (the) s 11 r (user) s 1012 1048 p (is) s 11 r (present) s 11 r 91 c (16) s (].) s 16 r (The) s 12 r (virus) s 10 r (took) s 10 r (advantage) s 11 r (of) s 11 r (the) s 11 r (latter) s 10 r 175 c (aw) s 1012 1097 p (to) s 11 r (propagate) s 11 r (between) s 11 r (accounts) s 12 r (on) s 11 r (trusted) s 10 r (machines.) s 18 r (Least) s 1012 1147 p (privilege) s 14 r (would) s 13 r (also) s 15 r (indicate) s 14 r (that) s 14 r (the) s 15 r (lists) s 14 r (of) s 14 r (trusted) s 14 r (ma-) s 1012 1197 p (chines) s 13 r (be) s 12 r (only) s 11 r (accessible) s 14 r (to) s 11 r (the) s 12 r (daemons) s 13 r (who) s 11 r (need) s 13 r (to) s 11 r (de-) s 1012 1247 p (cide) s 11 r (to) s 10 r (whether) s 10 r (or) s 10 r (not) s 9 r (to) s 10 r (grant) s 9 r (access) s 1 r 46 c t-bol.300 @sf 1012 1408 p (2.1.5) s 42 r (Information) s 15 r (Flow) s t-rom.300 @sf 1012 1504 p (When) s 16 r (it) s 14 r (became) s 17 r (clear) s 15 r (that) s 15 r (the) s 15 r (virus) s 14 r (was) s 15 r (propagating) s 14 r (via) s c-med.300 @sf 1012 1554 p (sendmail) s t-rom.300 @sf 44 c 13 r (the) s 11 r 174 c (rst) s 12 r (reaction) s 12 r (of) s 11 r (many) s 12 r (sites) s 12 r (was) s 13 r (to) s 11 r (cut) s 12 r (of) s 102 c 1012 1603 p (mail) s 10 r (service.) s 15 r (This) s 10 r (turned) s 9 r (out) s 10 r (to) s 9 r (be) s 11 r 97 c t-ita.300 @sf 10 r (serious) s t-rom.300 @sf 10 r (mistake,) s 11 r (since) s 1012 1653 p (it) s 9 r (cut) s 10 r (of) s 102 c 9 r (the) s 9 r (information) s 8 r (needed) s 11 r (to) s 9 r 174 c 120 c 10 r (the) s 9 r (problem.) s 14 r (Mailer) s 1012 1703 p (programs) s 12 r (on) s 10 r (major) s 12 r (forwarding) s 9 r (nodes,) s 12 r (such) s 12 r (as) s t-ita.300 @sf 12 r 114 c -1 r (elay) s -1 r (.cs.net) s t-rom.300 @sf 44 c 1012 1753 p (were) s 10 r (shut) s 8 r (down) s 8 r (delaying) s 8 r (some) s 10 r (critical) s 8 r (messages) s 11 r (by) s 8 r (as) s 10 r (long) s 1012 1803 p (as) s 18 r (twenty) s 15 r (hours.) s 32 r (Since) s 17 r (the) s 16 r (virus) s 16 r (had) s 16 r (alternate) s 17 r (infection) s 1012 1852 p (channels) s 9 r 40 c c-med.300 @sf (rexec) s t-rom.300 @sf 7 r (and) s c-med.300 @sf 8 r (finger) s t-rom.300 @sf (\),) s 8 r (this) s 7 r (made) s 8 r (the) s 8 r (isolated) s 7 r (ma-) s 1012 1902 p (chine) s 10 r 97 c 9 r (safe) s 10 r (haven) s 9 r (for) s 9 r (the) s 9 r (virus,) s 9 r (as) s 9 r (well) s 9 r (as) s 10 r (cutting) s 7 r (of) s 102 c 8 r (infor-) s 1012 1952 p (mation) s 8 r (from) s 9 r (machines) s 9 r (further) s 8 r 96 c -2 r (`downst) s -1 r (ream') s -2 r 39 c 7 r (\(thus) s 7 r (placing) s 1012 2002 p (them) s 8 r (in) s 7 r (greater) s 8 r (danger\)) s 7 r (since) s 8 r (no) s 8 r (information) s 5 r (about) s 7 r (the) s 7 r (virus) s 1012 2052 p (could) s 8 r (reach) s 8 r (them) s 8 r (by) s 8 r (mail) s cmr7.300 @sf 1425 2038 p 52 c t-rom.300 @sf 1443 2052 p 46 c 14 r (Thus,) s 8 r (by) s 8 r (attacking) s c-med.300 @sf 7 r (sendmail) s t-rom.300 @sf 44 c 1012 2102 p (the) s 16 r (virus) s 15 r (indirectly) s 14 r (attacked) s 16 r (the) s 15 r 175 c (ow) s 16 r (of) s 15 r (information) s 14 r (that) s 1012 2151 p (was) s 11 r (the) s 11 r (only) s 9 r (real) s 10 r (defense) s 11 r (against) s 10 r (its) s 10 r (spread.) s t-bol.360 @sf 1012 2321 p (2.2) s 51 r (Self) s 18 r (Pr) s (otection) s t-rom.300 @sf 1012 2417 p (The) s 12 r (virus) s 11 r (used) s 11 r 97 c 12 r (number) s 11 r (of) s 11 r (techniques) s 11 r (to) s 11 r (evade) s 12 r (detection.) s 1012 2466 p (It) s 15 r (attempted) s 15 r (both) s 14 r (to) s 14 r (cover) s 15 r (it) s 14 r (tracks) s 15 r (and) s 15 r (to) s 15 r (blend) s 14 r (into) s 14 r (the) s 1012 2516 p (normal) s 11 r (UNIX) s 11 r (environment) s 9 r (using) s 10 r (camou) s 175 c (age.) s 17 r (These) s 12 r (tech-) s 1012 2566 p (niques) s 10 r (had) s 11 r (had) s 10 r (varying) s 9 r (degrees) s 11 r (of) s 10 r (ef) s (fectiveness.) s 1012 2639 p 390 2 ru cmr6.300 @sf 1055 2667 p 52 c t-rom.240 @sf 1072 2678 p (USENET) s 16 r (news) s 13 r 91 c (17) s -1 r 93 c 15 r (was) s 13 r (an) s 14 r (ef) s (fective) s 13 r (side-channe) s -1 r 108 c 13 r (of) s 14 r (information) s 1012 2717 p (spread,) s 8 r (although) s 6 r 97 c 8 r (number) s 7 r (of) s 8 r (sites) s 8 r (disabled) s 7 r (that) s 8 r (as) s 8 r (well.) s t-rom.300 @sf 965 2842 p 52 c @eop 5 @bop0 cmr7.300 @sf [<07C01FE038707038703CF03CF03CF03CF03CF838FFF0F7E0F0007030787838781C380FF003E0> 14 19 -1 0 17] 54 @dc 5 @bop1 t-bol.300 @sf -36 96 p (2.2.1) s 40 r (Covering) s 16 r 84 c -2 r (racks) s t-rom.300 @sf -36 179 p (The) s 13 r (program) s 14 r (did) s 14 r 97 c 15 r (number) s 14 r (of) s 14 r (things) s 12 r (to) s 14 r (cover) s 15 r (its) s 13 r (trail.) s 25 r (It) s -36 229 p (erased) s 10 r (its) s 9 r (ar) s (gument) s 9 r (list,) s 10 r (once) s 10 r (it) s 9 r (had) s 10 r 174 c (nished) s 10 r (processing) s 10 r (the) s -36 279 p (ar) s (guments,) s 11 r (so) s 13 r (that) s 12 r (the) s 13 r (process) s 13 r (status) s 12 r (command) s 14 r (would) s 11 r (not) s -36 329 p (show) s 9 r (how) s 9 r (it) s 10 r (was) s 11 r (invoked.) s 4 381 p (It) s 12 r (also) s 13 r (deleted) s 12 r (the) s 13 r (executing) s 12 r (binary) s -2 r 44 c 12 r (which) s 12 r (would) s 12 r (leave) s -36 431 p (the) s 14 r (data) s 17 r (intact) s 15 r (but) s 15 r (unnamed,) s 18 r (and) s 16 r (only) s 15 r (referenced) s 17 r (by) s 16 r (the) s -36 481 p (execution) s 13 r (of) s 14 r (the) s 15 r (program.) s 28 r (If) s 14 r (the) s 15 r (machine) s 16 r (were) s 15 r (rebooted) s -36 531 p (whil) s -1 r 101 c 14 r (the) s 14 r (virus) s 14 r (was) s 15 r (actually) s 15 r (running,) s 14 r (the) s 15 r 174 c (le) s 14 r (system) s 16 r (sal-) s -36 580 p (vager) s 8 r (would) s 8 r (recover) s 9 r (the) s 9 r 174 c (le) s 9 r (after) s 9 r (the) s 9 r (reboot.) s 13 r (Otherwise) s 9 r (the) s -36 630 p (progr) s -1 r (am) s 10 r (would) s 9 r (vanish) s 9 r (after) s 11 r (exiting.) s 4 683 p (The) s 15 r (program) s 13 r (also) s 14 r (used) s 14 r (resource) s 15 r (limit) s 13 r (functions) s 12 r (to) s 14 r (pre-) s -36 733 p (vent) s 10 r 97 c 12 r (core) s 13 r (dump.) s 18 r (Thus,) s 13 r (it) s 11 r (prevented) s 11 r (any) s 12 r (bugs) s 11 r (in) s 12 r (the) s 11 r (pro-) s -36 782 p (gram) s 9 r (from) s 10 r (leaving) s 10 r (tell-tale) s 9 r (traces) s 11 r (behind.) s t-bol.300 @sf -36 908 p (2.2.2) s 40 r (Camou\015age) s t-rom.300 @sf -36 991 p (It) s 11 r (was) s 14 r (compiled) s 13 r (under) s 12 r (the) s 13 r (name) s c-med.300 @sf 15 r (sh) s t-rom.300 @sf 44 c 14 r (the) s 13 r (same) s 14 r (name) s 14 r (used) s -36 1041 p (by) s 13 r (the) s 14 r (Bourne) s 14 r (Shell,) s 15 r 97 c 15 r (command) s 15 r (interpreter) s 14 r (which) s 14 r (is) s 14 r (of-) s -36 1091 p (ten) s 10 r (used) s 12 r (in) s 11 r (shell) s 11 r (scripts) s 11 r (and) s 12 r (automatic) s 11 r (commands.) s 19 r (Even) s 12 r 97 c -36 1140 p (dil) s -1 r (igent) s 8 r (system) s 11 r (manager) s 11 r (would) s 9 r (probably) s 9 r (not) s 10 r (notice) s 9 r 97 c 11 r (lar) s (ge) s -36 1190 p (number) s 9 r (of) s 10 r (shells) s 10 r (running) s 8 r (for) s 10 r (short) s 9 r (periods) s 10 r (of) s 10 r (time.) s 4 1243 p (The) s 16 r (virus) s 14 r (forked,) s 16 r (splitti) s -1 r (ng) s 13 r (into) s 14 r 97 c 15 r (parent) s 15 r (and) s 15 r (child,) s 15 r (ap-) s -36 1293 p (proxi) s -1 r (mately) s 13 r (every) s 14 r (three) s 15 r (minutes.) s 26 r (The) s 15 r (parent) s 15 r (would) s 13 r (then) s -36 1342 p (exit,) s 18 r (leaving) s 18 r (the) s 18 r (child) s 17 r (to) s 18 r (continue) s 17 r (from) s 18 r (the) s 18 r (exact) s 19 r (same) s -36 1392 p (place.) s 12 r (This) s 8 r (had) s 8 r (the) s 7 r (ef) s (fect) s 8 r (of) s 7 r 96 c -2 r (`refreshing') s -3 r 39 c 5 r (the) s 8 r (process,) s 9 r (since) s -36 1442 p (the) s 5 r (new) s 7 r (fork) s 7 r (started) s 6 r (of) s 102 c 6 r (with) s 6 r (no) s 6 r (resources) s 8 r (used,) s 8 r (such) s 7 r (as) s 8 r (CPU) s -36 1492 p (time) s 12 r (or) s 13 r (memory) s 14 r (usage.) s 25 r (It) s 13 r (also) s 13 r (kept) s 13 r (each) s 15 r (run) s 13 r (of) s 13 r (the) s 13 r (virus) s -36 1542 p (short,) s 8 r (making) s 9 r (the) s 9 r (virus) s 8 r 97 c 10 r (more) s 10 r (dif) s 174 c (cult) s 7 r (to) s 9 r (seize,) s 11 r (even) s 10 r (when) s -36 1591 p (it) s 9 r (had) s 9 r (been) s 11 r (noticed.) s 4 1644 p (All) s 14 r (the) s 15 r (constant) s 14 r (strings) s 14 r (used) s 15 r (by) s 15 r (the) s 15 r (program) s 14 r (were) s 16 r (ob-) s -36 1694 p (scured) s 10 r (by) s 11 r (XOR'ing) s 11 r (each) s 12 r (character) s 13 r (with) s 10 r (the) s 12 r (constant) s 10 r (81) s cmr7.300 @sf 892 1700 p (16) s t-rom.300 @sf 927 1694 p 46 c -36 1744 p (This) s 10 r (meant) s 12 r (that) s 10 r (one) s 12 r (could) s 11 r (not) s 10 r (simply) s 11 r (look) s 10 r (at) s 11 r (the) s 12 r (binary) s 10 r (to) s -36 1794 p (determine) s 14 r (what) s 15 r (constants) s 15 r (the) s 15 r (virus) s 14 r (refered) s 16 r (to) s 14 r (\(e.g.) s 30 r (what) s -36 1843 p 174 c (les) s 13 r (it) s 13 r (opened\).) s 26 r (But) s 14 r (it) s 13 r (was) s 15 r 97 c 15 r (weak) s 15 r (method) s 13 r (of) s 14 r (hiding) s 13 r (the) s -36 1893 p (strin) s -1 r (gs;) s 13 r (it) s 14 r (delayed) s 14 r (ef) s (forts) s 12 r (to) s 13 r (understand) s 13 r (the) s 14 r (virus,) s 14 r (but) s 13 r (not) s -36 1943 p (for) s 8 r (very) s 10 r (long.) s t-bol.360 @sf -36 2077 p (2.3) s 49 r (Flaws) s t-rom.300 @sf -36 2160 p (The) s 7 r (virus) s 8 r (also) s 8 r (had) s 9 r 97 c 8 r (number) s 9 r (of) s 8 r 175 c (aws,) s 9 r (ranging) s 8 r (from) s 8 r (the) s 8 r (sub-) s -36 2210 p (tle) s 8 r (to) s 10 r (the) s 10 r (clumsy) s -2 r 46 c 14 r (One) s 10 r (of) s 10 r (the) s 10 r (later) s 10 r (messages) s 13 r (from) s 10 r (Berkeley) s -36 2259 p (posted) s 6 r 174 c (xes) s 8 r (for) s 8 r (some) s 8 r (of) s 8 r (the) s 8 r (more) s 8 r (obvious) s 6 r (ones,) s 9 r (as) s 9 r 97 c 8 r (humor-) s -36 2309 p (ous) s 9 r (gesture.) s t-bol.300 @sf -36 2435 p (2.3.1) s 40 r (Reinfection) s 16 r (pr) s (evention) s t-rom.300 @sf -36 2518 p (The) s 10 r (code) s 11 r (for) s 11 r (preventing) s 9 r (reinfection) s 10 r (of) s 10 r (an) s 11 r (actively) s 11 r (infected) s -36 2568 p (machine) s 13 r (harbored) s 14 r (some) s 15 r (major) s 14 r 175 c (aws.) s 27 r (These) s 15 r 175 c (aws) s 15 r (turned) s -36 2617 p (out) s 11 r (to) s 12 r (be) s 13 r (critical) s 13 r (to) s 12 r (the) s 13 r (ultimate) s 12 r 96 c -2 r (`failure') s -3 r 39 c 11 r (of) s 13 r (the) s 13 r (virus,) s 13 r (as) s -36 2667 p (reinfection) s 8 r (drove) s 10 r (up) s 9 r (the) s 10 r (load) s 10 r (of) s 10 r (many) s 11 r (machines,) s 11 r (causing) s 10 r (it) s -36 2717 p (to) s 8 r (be) s 11 r (noticed) s 9 r (and) s 11 r (thus) s 9 r (counterattacked.) s 1054 96 p (The) s 17 r (code) s 17 r (had) s 16 r (several) s 17 r (timing) s 15 r 175 c (aws) s 17 r (which) s 15 r (made) s 18 r (it) s 15 r (un-) s 1012 146 p (likely) s 10 r (to) s 10 r (work.) s 16 r (While) s 10 r (written) s 10 r (in) s 10 r 97 c 12 r 96 c -2 r (`paranoid') s -4 r 39 c 9 r (manner) s -1 r 44 c 12 r (us-) s 1012 196 p (ing) s 9 r (weak) s 9 r (authentication) s 7 r (\(exchanging) s 9 r 96 c -2 r (`magic') s -3 r 39 c 7 r (numbers\)) s 9 r (to) s 1012 246 p (determine) s 9 r (whether) s 8 r (the) s 7 r (other) s 8 r (end) s 8 r (of) s 8 r (the) s 8 r (connection) s 7 r (is) s 8 r (indeed) s 1012 295 p 97 c 11 r (copy) s 9 r (of) s 9 r (the) s 10 r (virus,) s 9 r (these) s 10 r (routines) s 8 r (would) s 9 r (often) s 9 r (exit) s 9 r (with) s 8 r (er-) s 1012 345 p (rors) s 10 r (\(and) s 11 r (thus) s t-ita.300 @sf 9 r (not) s t-rom.300 @sf 10 r (attempt) s 9 r (to) s 10 r (quit\)) s 9 r (if:) s cmsy10.300 @sf 1054 406 p 15 c t-rom.300 @sf 20 r (several) s 17 r (viruses) s 15 r (infected) s 15 r 97 c 16 r (clean) s 16 r (machine) s 16 r (at) s 16 r (once,) s 17 r (in) s 1095 456 p (which) s 11 r (case) s 13 r (all) s 11 r (of) s 11 r (them) s 12 r (would) s 10 r (look) s 10 r (for) s 11 r (listeners;) s 11 r (none) s 1095 506 p (of) s 16 r (them) s 16 r (would) s 15 r 174 c (nd) s 16 r (any;) s 18 r (all) s 15 r (of) s 16 r (them) s 16 r (would) s 15 r (attempt) s 1095 556 p (to) s 16 r (become) s 18 r (listeners;) s 18 r (one) s 17 r (would) s 15 r (succeed;) s 21 r (the) s 16 r (others) s 1095 605 p (would) s 9 r (fail,) s 10 r (give) s 10 r (up,) s 10 r (and) s 10 r (thus) s 10 r (be) s 10 r (invulnerable) s 9 r (to) s 9 r (future) s 1095 655 p (checking) s 11 r (attempts.) s cmsy10.300 @sf 1054 705 p 15 c t-rom.300 @sf 20 r (several) s 16 r (viruses) s 14 r (starting) s 13 r (at) s 14 r (once,) s 17 r (in) s 14 r (the) s 14 r (presence) s 16 r (of) s 14 r 97 c 1095 755 p (running) s 14 r (virus.) s 28 r (If) s 15 r (the) s 16 r 174 c (rst) s 15 r (one) s 15 r 96 c -2 r (`wins) s 13 r (the) s 15 r (coin) s 15 r (toss') s -2 r 39 c 1095 805 p (with) s 13 r (the) s 14 r (listening) s 11 r (virus,) s 15 r (other) s 13 r (new-starting) s 12 r (ones) s 14 r (will) s 1095 854 p (have) s 10 r (contacted) s 9 r (the) s 8 r (losing) s 8 r (one) s 9 r (and) s 8 r (have) s 10 r (the) s 8 r (connection) s 1095 904 p (closed) s 11 r (upon) s 9 r (them,) s 11 r (permitting) s 8 r (them) s 11 r (to) s 10 r (continue.) s cmsy10.300 @sf 1054 954 p 15 c t-rom.300 @sf 20 r 97 c 8 r (machine) s 7 r (is) s 7 r (slow) s 6 r (or) s 7 r (heavily) s 6 r (loaded,) s 8 r (which) s 6 r (could) s 6 r (cause) s 1095 1004 p (the) s 15 r (virus) s 13 r (to) s 14 r (exceed) s 16 r (the) s 14 r (timeouts) s 14 r (imposed) s 14 r (on) s 14 r (the) s 14 r (ex-) s 1095 1054 p (change) s 9 r (of) s 7 r (numbers,) s 9 r (especially) s 8 r (if) s 7 r (the) s 8 r (compiler) s 7 r (was) s 8 r (run-) s 1095 1103 p (ning) s 10 r (\(possibly) s 9 r (multiple) s 9 r (times\)) s 10 r (due) s 11 r (to) s 10 r 97 c 11 r (new) s 10 r (infection;) s 1095 1153 p (note) s 9 r (that) s 8 r (this) s 7 r (is) s 9 r (exacerbated) s 9 r (by) s 9 r 97 c 9 r (busy) s 8 r (machine) s 9 r (\(which) s 1095 1203 p (slows) s 10 r (down) s 10 r (further\)) s 9 r (on) s 10 r 97 c 11 r (moderately) s 10 r (sized) s 11 r (network.) s 1012 1264 p (Note) s 8 r (that) s 7 r 96 c -2 r (`at) s 6 r (once') s -2 r 39 c 7 r (means) s 9 r 96 c -2 r (`wit) s -1 r (hin) s 5 r 97 c 8 r (5-20) s 7 r (second) s 8 r (window') s -2 r 39 c 1012 1314 p (in) s 10 r (most) s 10 r (cases,) s 13 r (and) s 10 r (is) s 10 r (sometimes) s 11 r (looser) s -1 r 46 c 1054 1365 p 65 c 11 r (critical) s 10 r (weakness) s 12 r (in) s 11 r (the) s 10 r (interlocking) s 9 r (code) s 11 r (is) s 11 r (that) s 10 r (even) s 1012 1415 p (when) s 15 r (it) s t-ita.300 @sf 13 r (does) s t-rom.300 @sf 14 r (decide) s 15 r (to) s 13 r (quit,) s 14 r (all) s 14 r (it) s 13 r (does) s 15 r (is) s 14 r (set) s 14 r (the) s 14 r (variable) s c-med.300 @sf 1012 1465 p (pleasequit) s t-rom.300 @sf 46 c 15 r (This) s 11 r (variable) s 11 r (does) s 10 r (not) s 10 r (have) s 12 r (an) s 11 r (ef) s (fect) s 10 r (until) s 1012 1514 p (the) s 11 r (virus) s 9 r (has) s 11 r (gone) s 10 r (through) s cmsy10.300 @sf 1054 1566 p 15 c t-rom.300 @sf 20 r (collecting) s 10 r (the) s 10 r (entire) s 10 r (list) s 9 r (of) s 10 r (host) s 9 r (names) s 12 r (to) s 9 r (attack) s cmsy10.300 @sf 1054 1616 p 15 c t-rom.300 @sf 20 r (collecting) s 10 r (the) s 10 r (entire) s 10 r (list) s 9 r (of) s 10 r (user) s 10 r (names) s 12 r (to) s 9 r (attack) s cmsy10.300 @sf 1054 1665 p 15 c t-rom.300 @sf 20 r (trying) s 7 r (to) s 8 r (attack) s 9 r (all) s 8 r (of) s 8 r (the) s 8 r 96 c -2 r (`obvi) s -1 r (ous') s -3 r 39 c 6 r (permutation) s 7 r (pass-) s 1095 1715 p (words) s 10 r (\(see) s 12 r (Section) s 9 r (A.4.3\)) s cmsy10.300 @sf 1054 1765 p 15 c t-rom.300 @sf 20 r (trying) s 15 r (ten) s 16 r (words) s 15 r (selected) s 17 r (at) s 16 r (random) s 16 r (from) s 16 r (the) s 16 r (inter-) s 1095 1815 p (nal) s 10 r (dictionary) s 8 r (\(see) s 10 r (Appendix) s 9 r (B\)) s 9 r (against) s 9 r (all) s 10 r (of) s 9 r (the) s 9 r (user) s 1095 1865 p (names) s 1054 1916 p (Since) s 13 r (the) s 13 r (virus) s 12 r (was) s 13 r (careful) s 13 r (to) s 12 r (clean) s 14 r (up) s 12 r (temporary) s 13 r 174 c (les,) s 1012 1966 p (its) s 10 r (presence) s 12 r (alone) s 10 r (didn') s 116 c 8 r (interfere) s 10 r (with) s 9 r (reinfection.) s 1054 2017 p (Also,) s 8 r 97 c 9 r (multiply) s 6 r (infected) s 8 r (machine) s 8 r (would) s 7 r (spread) s 9 r (the) s 7 r (virus) s 1012 2067 p (faster) s -1 r 44 c 10 r (perhaps) s 10 r (proporti) s -1 r (onall) s -1 r 121 c 8 r (to) s 9 r (the) s 9 r (number) s 9 r (of) s 9 r (infections) s 8 r (it) s 1012 2116 p (was) s 11 r (harboring,) s 10 r (since) s cmsy10.300 @sf 1054 2168 p 15 c t-rom.300 @sf 20 r (the) s 15 r (program) s 13 r (scrambles) s 16 r (the) s 14 r (lists) s 13 r (of) s 14 r (hosts) s 14 r (and) s 14 r (users) s 14 r (it) s 1095 2217 p (attacks;) s 12 r (since) s 11 r (the) s 11 r (random) s 11 r (number) s 11 r (generator) s 11 r (is) s 11 r (seeded) s 1095 2267 p (with) s 9 r (the) s 10 r (current) s 10 r (time,) s 11 r (the) s 9 r (separate) s 12 r (instances) s 10 r (are) s 11 r (likely) s 1095 2317 p (to) s 10 r (hit) s 9 r (separate) s 12 r (tar) s (gets.) s cmsy10.300 @sf 1054 2367 p 15 c t-rom.300 @sf 20 r (the) s 19 r (program) s 18 r (tries) s 18 r (to) s 18 r (spend) s 18 r 97 c 19 r (lar) s (ge) s 18 r (amount) s 18 r (of) s 18 r (time) s 1095 2417 p (sleeping) s 21 r (and) s 22 r (listening) s 19 r (for) s 21 r (other) s 21 r (infection) s 20 r (attempts) s 1095 2467 p (\(which) s 11 r (never) s 11 r (report) s 11 r (themselves\)) s 11 r (so) s 11 r (that) s 11 r (the) s 10 r (processes) s 1095 2516 p (would) s 10 r (share) s 11 r (the) s 10 r (resources) s 11 r (of) s 10 r (the) s 10 r (machine) s 11 r (fairly) s 9 r (well.) s 1054 2568 p (Thus,) s 8 r (the) s 8 r (virus) s 6 r (spread) s 8 r (much) s 8 r (more) s 7 r (quickly) s 6 r (than) s 7 r (the) s 7 r (perpe-) s 1012 2617 p (trator) s 11 r (expected,) s 13 r (and) s 12 r (was) s 12 r (noticed) s 11 r (for) s 12 r (that) s 11 r (very) s 11 r (reason.) s 19 r (The) s 1012 2667 p (MIT) s 14 r (Media) s 14 r (Lab,) s 16 r (for) s 13 r (example,) s 16 r (cut) s 14 r (themselves) s 14 r (completely) s 1012 2717 p (of) s 102 c 13 r (from) s 14 r (the) s 13 r (network) s 13 r (because) s 15 r (the) s 14 r (computer) s 14 r (resources) s 14 r (ab-) s 965 2842 p 53 c @eop 6 @bop0 cmr7.300 @sf [<1F007F80E1C0F0E0F0F070F000F000F060E071E07FC06F006000600060007F007FC07FE06060> 12 19 -2 0 17] 53 @dc cmr6.300 @sf [<3F007F80E1C0E0E040E000E060E070C07F806F00600060007E007F007F806080> 11 16 -1 0 15] 53 @dc 6 @bop1 t-rom.300 @sf -36 96 p (sorbed) s 9 r (by) s 9 r (the) s 10 r (virus) s 10 r (were) s 11 r (detracting) s 9 r (from) s 10 r (work) s 10 r (in) s 9 r (progress,) s -36 146 p (whil) s -1 r 101 c 9 r (the) s 10 r (lack) s 11 r (of) s 10 r (network) s 9 r (service) s 11 r (was) s 11 r 97 c 11 r (minor) s 9 r (problem.) s t-bol.300 @sf -36 256 p (2.3.2) s 40 r (Heuristics) s t-rom.300 @sf -36 333 p (One) s 12 r (attempt) s 12 r (to) s 12 r (make) s 14 r (the) s 12 r (program) s 13 r (not) s 12 r (waste) s 13 r (time) s 13 r (on) s 12 r (non-) s -36 383 p (UNIX) s 8 r (systems) s 11 r (was) s 10 r (to) s 10 r (sometimes) s 10 r (try) s 9 r (to) s 10 r (open) s 9 r 97 c 11 r (telnet) s 9 r (or) s 10 r (rsh) s -36 433 p (connection) s 9 r (to) s 10 r 97 c 11 r (host) s 11 r (before) s 11 r (trying) s 9 r (to) s 10 r (attack) s 11 r (it) s 11 r (and) s 10 r (skipping) s -36 483 p (that) s 13 r (host) s 14 r (if) s 14 r (it) s 13 r (refused) s 15 r (the) s 15 r (connection.) s 26 r (If) s 15 r (the) s 14 r (host) s 14 r (refused) s -36 533 p (telnet) s 5 r (or) s 7 r (rsh) s 7 r (connections,) s 7 r (it) s 6 r (was) s 8 r (likely) s 6 r (to) s 6 r (refuse) s 8 r (other) s 6 r (attacks) s -36 582 p (as) s 9 r (well.) s 14 r (There) s 11 r (were) s 11 r (several) s 11 r (problems) s 10 r (with) s 9 r (this) s 10 r (heuristic:) s cmsy10.300 @sf 4 632 p 15 c t-rom.300 @sf 21 r 65 c 12 r (number) s 13 r (of) s 12 r (machines) s 13 r (exist) s 12 r (which) s 12 r (provide) s 12 r (mail) s 12 r (ser-) s 46 682 p (vice) s 9 r (\(for) s 8 r (example\)) s 10 r (but) s 8 r (that) s 9 r (do) s 8 r (not) s 9 r (provide) s 8 r (telnet) s 8 r (or) s 9 r (rsh) s 46 732 p (service,) s 19 r (and) s 16 r (although) s 15 r (vulnerable,) s 18 r (would) s 16 r (be) s 17 r (ignored) s 46 782 p (under) s 12 r (this) s 13 r (attack.) s 23 r (The) s 14 r (MIT) s 14 r (Project) s 13 r (Athena) s 13 r (mailhub,) s t-ita.300 @sf 46 832 p (athena.mit.edu) s t-rom.300 @sf 44 c 9 r (is) s 10 r (but) s 10 r (one) s 10 r (example.) s cmsy10.300 @sf 4 881 p 15 c t-rom.300 @sf 21 r (The) s 19 r (telnet) s 18 r 96 c -2 r (`probin) s -1 r (g') s -3 r 39 c 17 r (code) s 19 r (immediately) s 19 r (closed) s 19 r (the) s 46 931 p (connection) s 17 r (upon) s 17 r 174 c (nding) s 16 r (that) s 17 r (it) s 17 r (had) s 18 r (opened) s 18 r (it.) s 36 r (By) s 46 981 p (the) s 12 r (time) s 13 r (the) s 13 r 96 c -2 r (`inet) s 11 r (daemon') s -2 r (',) s 13 r (the) s 12 r 96 c -2 r (`switchin) s -1 r 103 c 11 r (station') s -2 r 39 c 46 1031 p (which) s 9 r (handles) s 10 r (most) s 10 r (incoming) s 9 r (network) s 9 r (services,) s 11 r (iden-) s 46 1081 p (ti) s 174 c (ed) s 11 r (the) s 12 r (connection) s 12 r (and) s 12 r (started) s 12 r 97 c 13 r (telnet) s 12 r (daemon,) s 14 r (the) s 46 1130 p (connection) s 8 r (was) s 10 r (already) s 9 r (closed,) s 10 r (causing) s 9 r (the) s 9 r (telnet) s 9 r (dae-) s 46 1180 p (mon) s 9 r (to) s 9 r (indicate) s 9 r (an) s 10 r (error) s 9 r (condition) s 8 r (of) s 9 r (high) s 9 r (enough) s 9 r (pri-) s 46 1230 p (ority) s 12 r (to) s 14 r (be) s 15 r (logged) s 13 r (on) s 14 r (most) s 14 r (systems.) s 27 r (Thus) s 14 r (the) s 15 r (times) s 46 1280 p (of) s 10 r (the) s 12 r (earliest) s 11 r (attacks) s 11 r (were) s 12 r (noted,) s 12 r (if) s 10 r (not) s 11 r (the) s 11 r (machines) s 46 1330 p (they) s 9 r (came) s 12 r (from.) s t-bol.300 @sf -36 1439 p (2.3.3) s 40 r 86 c -3 r (ulnerabilities) s 14 r (not) s 16 r (used) s t-rom.300 @sf -36 1517 p (The) s 6 r (virus) s 7 r (did) s 6 r (not) s 6 r (exploit) s 6 r 97 c 7 r (number) s 7 r (of) s 7 r (obvious) s 6 r (opportuni) s -1 r (ties.) s cmsy10.300 @sf 4 1567 p 15 c t-rom.300 @sf 21 r (When) s 9 r (looking) s 8 r (for) s 8 r (lists) s 9 r (of) s 9 r (hosts) s 9 r (to) s 9 r (attack,) s 10 r (it) s 8 r (could) s 9 r (have) s 46 1617 p (done) s 9 r 96 c -2 r (`zone) s 8 r (transfers') s -2 r 39 c 8 r (from) s 9 r (the) s 9 r (Internet) s 9 r (domain) s 9 r (name) s 46 1667 p (servers) s 16 r (to) s 15 r 174 c (nd) s 16 r (names) s 17 r (of) s 15 r (valid) s 15 r (hosts) s 15 r 91 c (18) s (].) s 30 r (Many) s 16 r (of) s 46 1716 p (these) s 18 r (records) s 19 r (also) s 19 r (include) s 17 r (host) s 18 r (type,) s 21 r (so) s 18 r (the) s 18 r (search) s 46 1766 p (could) s 12 r (have) s 13 r (limited) s 11 r (itself) s 12 r (to) s 12 r (the) s 13 r (appropriate) s 11 r (processor) s 46 1816 p (and) s 10 r (operating) s 9 r (system) s 11 r (types.) s cmsy10.300 @sf 4 1866 p 15 c t-rom.300 @sf 21 r (It) s 13 r (did) s 14 r (not) s 13 r (attack) s 14 r (both) s 13 r (machine) s 15 r (types) s 14 r (consistently) s -2 r 46 c 24 r (If) s 46 1916 p (the) s 10 r 86 c -4 r (AX) s 8 r 174 c (nger) s 11 r (attack) s 10 r (failed,) s 10 r (it) s 10 r (could) s 9 r (have) s 11 r (tried) s 9 r 97 c 11 r (Sun) s 46 1965 p (attack,) s 10 r (but) s 10 r (that) s 9 r (hadn') s 116 c 9 r (been) s 11 r (implemented.) s cmsy10.300 @sf 4 2015 p 15 c t-rom.300 @sf 21 r (It) s 10 r (did) s 10 r (not) s 10 r (try) s 10 r (to) s 11 r 174 c (nd) s 10 r (privileged) s 10 r (users) s 11 r (on) s 11 r (the) s 11 r (local) s 10 r (host) s 46 2065 p (\(such) s 10 r (as) s c-med.300 @sf 11 r (root) s t-rom.300 @sf (\).) s t-bol.360 @sf -36 2183 p (2.4) s 49 r (Defenses) s t-rom.300 @sf -36 2261 p (There) s 9 r (were) s 10 r (many) s 9 r (attempts) s 9 r (to) s 9 r (stop) s 8 r (the) s 10 r (virus.) s 12 r (They) s 10 r (varied) s 9 r (in) s -36 2311 p (inconv) s -1 r (enience) s 12 r (to) s 13 r (the) s 13 r (end) s 13 r (users) s 13 r (of) s 13 r (the) s 12 r (vulnerable) s 13 r (systems,) s -36 2361 p (in) s 10 r (the) s 13 r (amount) s 12 r (of) s 12 r (skill) s 12 r (required) s 12 r (to) s 12 r (implement) s 12 r (them,) s 14 r (and) s 12 r (in) s -36 2410 p (their) s 8 r (ef) s (fectiveness.) s cmsy10.300 @sf 4 2468 p 15 c t-rom.300 @sf 21 r (Full) s 13 r (isolation) s 12 r (from) s 14 r (network) s 13 r (was) s 14 r (frequently) s 13 r (inconve-) s 46 2518 p (nient,) s 8 r (but) s 9 r (was) s 9 r (very) s 9 r (ef) s (fective) s 9 r (in) s 9 r (stopping) s 7 r (the) s 9 r (virus,) s 9 r (and) s 46 2568 p (was) s 10 r (simple) s 11 r (to) s 9 r (implement.) s cmsy10.300 @sf 4 2617 p 15 c t-rom.300 @sf 21 r 84 c (urni) s -1 r (ng) s 9 r (of) s 102 c 10 r (mail) s 11 r (service) s 12 r (was) s 11 r (inconvenient) s 10 r (both) s 10 r (to) s 10 r (lo-) s 46 2667 p (cal) s 12 r (users) s 13 r (and) s 13 r (to) s 12 r 96 c -2 r (`downst) s -1 r (ream') s -2 r 39 c 10 r (sites,) s 14 r (was) s 13 r (inef) s (fective) s 46 2717 p (at) s 10 r (stopping) s 8 r (the) s 10 r (virus,) s 10 r (but) s 10 r (was) s 10 r (simple) s 11 r (to) s 9 r (implement.) s cmsy10.300 @sf 1054 96 p 15 c t-rom.300 @sf 20 r (Patching) s 8 r (out) s 8 r (the) s c-med.300 @sf 8 r (debug) s t-rom.300 @sf 8 r (command) s 9 r (in) s c-med.300 @sf 7 r (sendmail) s t-rom.300 @sf 8 r (was) s 1095 146 p (only) s 11 r (ef) s (fective) s 11 r (in) s 10 r (conjunction) s 10 r (with) s 10 r (other) s 11 r 174 c (xes,) s 12 r (did) s 10 r (not) s 1095 196 p (interfere) s 7 r (with) s 6 r (normal) s 7 r (users,) s 9 r (and) s 7 r (simple) s 7 r (instructions) s 5 r (for) s 1095 246 p (implementing) s 10 r (the) s 10 r (change) s 11 r (were) s 11 r (available.) s cmsy10.300 @sf 1054 295 p 15 c t-rom.300 @sf 20 r (Shutting) s 13 r (down) s 14 r (the) s 15 r 174 c (nger) s 15 r (daemon) s 15 r (was) s 15 r (also) s 15 r (ef) s (fective) s 1095 345 p (only) s 11 r (if) s 12 r (the) s 11 r (other) s 12 r (holes) s 11 r (were) s 13 r (plugged) s 11 r (as) s 13 r (well,) s 12 r (was) s 12 r (an-) s 1095 395 p (noying) s 11 r (to) s 12 r (users) s 13 r (if) s 11 r (not) s 12 r (actually) s 12 r (inconvenient,) s 12 r (and) s 12 r (was) s 1095 445 p (simple) s 11 r (to) s 9 r (perform.) s cmsy10.300 @sf 1054 495 p 15 c t-rom.300 @sf 20 r (Fixing) s 15 r (the) s 16 r 174 c (nger) s 17 r (daemon) s 16 r (required) s 16 r (source) s 17 r (code,) s 18 r (but) s 1095 544 p (was) s 15 r (as) s 14 r (ef) s (fective) s 14 r (as) s 14 r (shutting) s 12 r (it) s 13 r (down,) s 14 r (without) s 12 r (annoy-) s 1095 594 p (ing) s 10 r (the) s 10 r (users) s 11 r (at) s 10 r (all.) s cmsy10.300 @sf 1054 644 p 15 c c-med.300 @sf 20 r (mkdir) s 25 r (/usr/tmp/sh) s t-rom.300 @sf 6 r (was) s 8 r (convenient,) s 8 r (simple,) s 8 r (and) s 1095 694 p (ef) s (fective) s 18 r (in) s 17 r (preventing) s 16 r (the) s 17 r (virus) s 17 r (from) s 18 r (propagating) s cmr7.300 @sf 1971 680 p 53 c t-rom.300 @sf 1095 744 p (\(See) s 12 r (Section) s 10 r (A.8.2.\)) s cmsy10.300 @sf 1054 793 p 15 c t-rom.300 @sf 20 r (De) s 174 c (ning) s c-med.300 @sf 16 r (pleasequit) s t-rom.300 @sf 16 r (in) s 15 r (the) s 17 r (system) s 16 r (libraries) s 16 r (was) s 1095 843 p (convenient,) s 10 r (simple,) s 9 r (and) s 10 r (did) s 8 r (almost) s 9 r (nothing) s 7 r (to) s 9 r (stop) s 9 r (the) s 1095 893 p (virus) s 10 r (\(See) s 11 r (Section) s 10 r (A.3.2.\)) s cmsy10.300 @sf 1054 943 p 15 c t-rom.300 @sf 20 r (Renaming) s 14 r (the) s 14 r (UNIX) s 13 r 67 c 14 r (compiler) s 13 r (and) s 14 r (linker) s 13 r 40 c c-med.300 @sf (cc) s t-rom.300 @sf 14 r (and) s c-med.300 @sf 1095 993 p (ld) s t-rom.300 @sf 41 c 12 r (was) s 12 r (drastic,) s 12 r (and) s 12 r (somewhat) s 12 r (inconvenient) s 10 r (to) s 11 r (users) s 1095 1043 p (\(though) s 16 r (much) s 18 r (less) s 18 r (so) s 17 r (than) s 17 r (cutting) s 16 r (of) s 102 c 16 r (the) s 17 r (network,) s 1095 1092 p (since) s 13 r (dif) s (ferent) s 10 r (names) s 13 r (were) s 13 r (available\)) s 12 r (but) s 11 r (ef) s (fective) s 11 r (in) s 1095 1142 p (stopping) s 9 r (the) s 10 r (virus.) s cmsy10.300 @sf 1054 1192 p 15 c t-rom.300 @sf 20 r (Requiring) s 11 r (new) s 13 r (passwords) s 12 r (for) s 12 r (all) s 12 r (users) s 13 r (\(or) s 12 r (at) s 12 r (least) s 13 r (all) s 1095 1242 p (users) s 9 r (who) s 8 r (had) s 9 r (passwords) s 9 r (which) s 8 r (the) s 8 r (virus) s 8 r (could) s 7 r (guess\)) s 1095 1292 p (was) s 16 r (dif) s 174 c (cult) s -1 r 44 c 14 r (but) s 14 r (it) s 14 r (only) s 13 r (inconvenienced) s 14 r (those) s 14 r (users) s 1095 1341 p (with) s 9 r (weak) s 11 r (passwords) s 10 r (to) s 9 r (begin) s 9 r (with,) s 10 r (and) s 9 r (was) s 11 r (ef) s (fective) s 1095 1391 p (in) s 10 r (conjunction) s 9 r (with) s 9 r (the) s 11 r (other) s 10 r 174 c (xes) s 11 r (\(See) s 11 r (Section) s 10 r (A.4.3) s 1095 1441 p (and) s 11 r (Appendix) s 9 r (B.\)) s 1054 1500 p (After) s 9 r (the) s 8 r (virus) s 8 r (was) s 10 r (analyzed,) s 10 r 97 c 10 r (tool) s 7 r (which) s 9 r (duplicated) s 8 r (the) s 1012 1550 p (password) s 16 r (attack) s 15 r (\(including) s 13 r (the) s 15 r (virus') s 14 r (internal) s 14 r (dictionary\)) s 1012 1600 p (was) s 8 r (posted) s 7 r (to) s 6 r (the) s 7 r (network.) s 12 r (This) s 7 r (tool) s 6 r (allowed) s 6 r (system) s 8 r (admin-) s 1012 1649 p (istrators) s 13 r (to) s 14 r (analyze) s 15 r (the) s 14 r (passwords) s 14 r (in) s 13 r (use) s 15 r (on) s 13 r (their) s 14 r (system.) s 1012 1699 p (The) s 14 r (spread) s 14 r (of) s 13 r (this) s 13 r (virus) s 12 r (should) s 12 r (be) s 14 r (ef) s (fective) s 13 r (in) s 12 r (raising) s 13 r (the) s 1012 1749 p (awareness) s 15 r (of) s 12 r (users) s 13 r (\(and) s 13 r (administrators\)) s 11 r (to) s 12 r (the) s 13 r (importance) s 1012 1799 p (of) s 15 r (choosing) s 14 r 96 c -2 r (`dif) s -1 r 174 c (cult) s -1 r 39 c -3 r 39 c 13 r (passwords.) s 28 r (Lawrence) s 17 r (Livermore) s 1012 1849 p (National) s 7 r (Laboratories) s 7 r (went) s 7 r (as) s 8 r (far) s 8 r (as) s 8 r (requiring) s 6 r (all) s 7 r (passwords) s 1012 1898 p (be) s 8 r (changed,) s 9 r (and) s 8 r (modifying) s 5 r (the) s 8 r (password) s 7 r (changing) s 7 r (program) s 1012 1948 p (to) s 8 r (test) s 9 r (new) s 9 r (passwords) s 8 r (against) s 9 r (the) s 8 r (lists) s 8 r (that) s 8 r (include) s 8 r (the) s 8 r (pass-) s 1012 1998 p (words) s 10 r (attacked) s 11 r (by) s 10 r (the) s 10 r (virus) s 9 r 91 c 54 c (].) s t-bol.420 @sf 1012 2140 p 51 c 59 r (Lessons) s 21 r (and) s 23 r (Open) s 23 r (Issues) s t-rom.300 @sf 1012 2233 p (The) s 14 r (virus) s 12 r (incident) s 12 r (taught) s 12 r (many) s 13 r (important) s 12 r (lessons.) s 22 r (It) s 13 r (also) s 1012 2283 p (brought) s 8 r (up) s 9 r (many) s 9 r (more) s 10 r (dif) s 174 c (cult) s 7 r (issues) s 9 r (which) s 9 r (need) s 9 r (to) s 9 r (be) s 9 r (ad-) s 1012 2333 p (dressed) s 11 r (in) s 10 r (the) s 10 r (future) s 10 r 58 c cmsy10.300 @sf 1054 2426 p 15 c t-rom.300 @sf 20 r (Least) s 16 r (Privilege.) s 27 r (This) s 14 r (basic) s 15 r (security) s 15 r (principle) s 13 r (is) s 15 r (fre-) s 1095 2476 p (quently) s 9 r (ignored) s 10 r (and) s 10 r (this) s 9 r (can) s 11 r (result) s 10 r (in) s 10 r (disaster) s -1 r 46 c cmsy10.300 @sf 1054 2560 p 15 c t-rom.300 @sf 20 r 96 c -2 r (`W) s -2 r 101 c 10 r (have) s 13 r (met) s 12 r (the) s 12 r (enemy) s 13 r (and) s 12 r (he) s 12 r (is) s 12 r (us.') s -2 r 39 c 18 r (The) s 13 r (alleged) s 1095 2610 p (author) s 9 r (of) s 9 r (the) s 9 r (virus) s 9 r (has) s 9 r (made) s 11 r (contributi) s -1 r (ons) s 7 r (to) s 9 r (the) s 9 r (com-) s 1012 2639 p 390 2 ru cmr6.300 @sf 1055 2667 p 53 c t-rom.240 @sf 1072 2678 p (However) s 44 c 9 r (both) s 10 r (sets) s 10 r (of) s 11 r (binaries) s 10 r (were) s 10 r (still) s 11 r (compiled,) s 11 r (consuming) s 8 r (pro-) s 1012 2717 p (cessor) s 8 r (time) s 8 r (on) s 8 r (an) s 7 r (attacked) s 7 r (machine.) s t-rom.300 @sf 965 2842 p 54 c @eop 7 @bop0 7 @bop1 t-rom.300 @sf 46 96 p (puter) s 13 r (security) s 14 r 174 c (eld) s 15 r (and) s 14 r (was) s 15 r (by) s 14 r (any) s 15 r (de) s 174 c (nition) s 13 r (an) s 14 r (in-) s 46 146 p (sider;) s 11 r (the) s 11 r (attack) s 12 r (did) s 11 r (not) s 11 r (come) s 12 r (from) s 12 r (an) s 12 r (outside) s 10 r (source) s 46 196 p (who) s 8 r (obtained) s 7 r (sensitive) s 8 r (information,) s 7 r (and) s 9 r (restricting) s 6 r (in-) s 46 246 p (formation) s 9 r (such) s 11 r (as) s 11 r (source) s 11 r (code) s 11 r (would) s 9 r (not) s 10 r (have) s 11 r (helped) s 46 295 p (prevent) s 9 r (this) s 10 r (incident.) s cmsy10.300 @sf 4 381 p 15 c t-rom.300 @sf 21 r (Diversity) s 15 r (is) s 16 r (good.) s 33 r (Though) s 16 r (the) s 16 r (virus) s 16 r (picked) s 16 r (on) s 17 r (the) s 46 431 p (most) s 12 r (widespread) s 13 r (operating) s 11 r (system) s 14 r (used) s 12 r (on) s 13 r (the) s 12 r (Inter-) s 46 481 p (net) s 10 r (and) s 11 r (on) s 11 r (the) s 11 r (two) s 10 r (most) s 11 r (popular) s 10 r (machine) s 11 r (types,) s 12 r (most) s 46 531 p (of) s 10 r (the) s 10 r (machines) s 11 r (on) s 11 r (the) s 10 r (network) s 9 r (were) s 12 r (never) s 11 r (in) s 9 r (danger) s -1 r 46 c 46 580 p 65 c 10 r (wider) s 10 r (variety) s 9 r (of) s 10 r (implementations) s 9 r (is) s 10 r (probably) s 9 r (good,) s 46 630 p (not) s 10 r (bad.) s 17 r (There) s 12 r (is) s 11 r 97 c 12 r (direct) s 10 r (analogy) s 11 r (with) s 10 r (biological) s 9 r (ge-) s 46 680 p (netic) s 10 r (diversity) s 8 r (to) s 10 r (be) s 10 r (made.) s cmsy10.300 @sf 4 766 p 15 c t-rom.300 @sf 21 r 96 c -2 r (`The) s 21 r (cure) s 24 r (shouldn') s -1 r 116 c 21 r (be) s 23 r (worse) s 23 r (than) s 22 r (the) s 23 r (disease.') s -2 r 39 c 46 816 p (Chuck) s 7 r (Cole) s 8 r (made) s 9 r (this) s 7 r (point) s 7 r (and) s 8 r (Clif) s 102 c 6 r (Stoll) s 7 r (also) s 8 r (ar) s (gued) s 46 866 p (that) s 10 r (it) s 9 r (may) s 12 r (be) s 10 r (more) s 11 r (expensive) s 11 r (to) s 10 r (prevent) s 10 r (such) s 11 r (attacks) s 46 915 p (than) s 10 r (it) s 10 r (is) s 10 r (to) s 10 r (clean) s 11 r (up) s 11 r (after) s 10 r (them.) s 16 r (Backups) s 10 r (are) s 12 r (good.) s 14 r (It) s 46 965 p (may) s 11 r (be) s 11 r (cheaper) s 12 r (to) s 10 r (restore) s 11 r (from) s 10 r (backups) s 11 r (than) s 10 r (to) s 10 r (try) s 10 r (to) s 46 1015 p 174 c (gure) s 10 r (out) s 9 r (what) s 10 r (damage) s 12 r (an) s 10 r (attacker) s 11 r (has) s 11 r (done[) s 54 c -1 r (].) s cmsy10.300 @sf 4 1101 p 15 c t-rom.300 @sf 21 r (Defenses) s t-ita.300 @sf 16 r (must) s t-rom.300 @sf 15 r (be) s 16 r (at) s 16 r (the) s 15 r (host) s 15 r (level,) s 17 r (not) s 14 r (the) s 15 r (network) s 46 1151 p (level.) s 35 r (Mike) s 17 r (Muuss) s 17 r (and) s 18 r (Clif) s 102 c 15 r (Stoll) s 16 r (have) s 18 r (made) s 18 r (this) s 46 1200 p (point) s 10 r (quite) s 10 r (eloquently[) s 54 c -2 r (].) s 18 r (The) s 13 r (network) s 11 r (performed) s 11 r (its) s 46 1250 p (function) s 7 r (perfectly) s 8 r (and) s 9 r (should) s 7 r (not) s 8 r (be) s 9 r (faulted;) s 8 r (the) s 9 r (tragic) s 46 1300 p 175 c (aws) s 11 r (were) s 12 r (in) s 10 r (several) s 11 r (application) s 10 r (programs.) s 15 r (Attempts) s 46 1350 p (to) s 8 r 174 c 120 c 9 r (the) s 9 r (network) s 9 r (are) s 10 r (misguided.) s 13 r (An) s 9 r (analogy) s 9 r (with) s 8 r (the) s 46 1400 p (highway) s 11 r (system) s 13 r (can) s 14 r (be) s 13 r (made:) s 19 r (anybody) s 11 r (can) s 14 r (drive) s 12 r (up) s 46 1449 p (to) s 9 r (your) s 9 r (house) s 10 r (and) s 10 r (probably) s 9 r (break) s 10 r (into) s 9 r (your) s 9 r (home,) s 10 r (but) s 46 1499 p (that) s 9 r (does) s 10 r (not) s 9 r (mean) s 10 r (we) s 11 r (should) s 8 r (close) s 10 r (down) s 10 r (the) s 9 r (roads) s 10 r (or) s 46 1549 p (put) s 9 r (armed) s 11 r (guards) s 10 r (on) s 10 r (the) s 10 r (exit) s 10 r (ramps.) s cmsy10.300 @sf 4 1635 p 15 c t-rom.300 @sf 21 r (Logging) s 14 r (information) s 13 r (is) s 15 r (important.) s 28 r (The) s c-med.300 @sf 16 r (inetd) s t-rom.300 @sf 16 r (and) s c-med.300 @sf 46 1685 p (telnetd) s t-rom.300 @sf 12 r (interaction) s 12 r (logging) s 11 r (the) s 13 r (source) s 14 r (of) s 12 r (virus) s 13 r (at-) s 46 1735 p (tacks) s 9 r (turned) s 8 r (out) s 9 r (to) s 8 r (be) s 10 r 97 c 10 r (lucky) s 8 r (break,) s 10 r (but) s 8 r (even) s 10 r (so) s 9 r (many) s 46 1784 p (sites) s 13 r (did) s 12 r (not) s 13 r (have) s 14 r (enough) s 12 r (logging) s 12 r (information) s 11 r (avail-) s 46 1834 p (able) s 11 r (to) s 11 r (identify) s 10 r (the) s 12 r (source) s 12 r (or) s 11 r (times) s 12 r (of) s 11 r (infection.) s 17 r (This) s 46 1884 p (greatly) s 6 r (hindered) s 6 r (the) s 7 r (responses,) s 8 r (since) s 7 r (people) s 7 r (frequently) s 46 1934 p (had) s 9 r (to) s 9 r (install) s 9 r (new) s 9 r (programs) s 10 r (which) s 9 r (logged) s 9 r (more) s 10 r (infor-) s 46 1984 p (mation.) s 14 r (On) s 10 r (the) s 10 r (other) s 10 r (hand,) s 11 r (logging) s 8 r (information) s 9 r (tends) s 46 2033 p (to) s 11 r (accumulate) s 13 r (quickly) s 11 r (and) s 12 r (is) s 12 r (rarely) s 12 r (referenced.) s 21 r (Thus) s 46 2083 p (it) s 11 r (is) s 12 r (frequently) s 11 r (automatically) s 11 r (pur) s (ged.) s 18 r (If) s 12 r (we) s 13 r (log) s 11 r (help-) s 46 2133 p (ful) s 9 r (information,) s 9 r (but) s 10 r 174 c (nd) s 10 r (it) s 9 r (is) s 11 r (quickly) s 9 r (pur) s (ged,) s 9 r (we) s 11 r (have) s 46 2183 p (not) s 9 r (improved) s 10 r (the) s 10 r (situtation) s 8 r (much) s 11 r (at) s 11 r (all.) s 14 r (Mike) s 10 r (Muuss-) s 46 2233 p (points) s 9 r (out) s 10 r (that) s 11 r (frequently) s 10 r (one) s 11 r (can) s 12 r (retrieve) s 11 r (such) s 11 r (infor-) s 46 2283 p (mation) s 9 r (from) s 10 r (backups[) s 54 c (],) s 10 r (but) s 10 r (this) s 9 r (is) s 10 r (not) s 10 r (always) s 10 r (true.) s cmsy10.300 @sf 4 2368 p 15 c t-rom.300 @sf 21 r (Denial) s 17 r (of) s 17 r (service) s 19 r (attacks) s 18 r (are) s 18 r (easy) s -2 r 46 c 37 r (The) s 18 r (Internet) s 17 r (is) s 46 2418 p (amazingly) s 14 r (vulnerable) s 13 r (to) s 13 r (such) s 14 r (attacks.) s 26 r (These) s 15 r (attacks) s 46 2468 p (are) s 7 r (quite) s 6 r (dif) s 174 c (cult) s 5 r (to) s 6 r (prevent,) s 8 r (but) s 6 r (we) s 7 r (could) s 6 r (be) s 8 r (much) s 7 r (bet-) s 46 2518 p (ter) s 7 r (prepared) s 8 r (to) s 7 r (identify) s 6 r (their) s 7 r (sources) s 9 r (than) s 7 r (we) s 8 r (are) s 9 r (today) s -2 r 46 c 46 2568 p (For) s 7 r (example,) s 9 r (currently) s 7 r (it) s 6 r (is) s 8 r (not) s 7 r (hard) s 7 r (to) s 7 r (imagine) s 8 r (writing) s 46 2617 p 97 c 13 r (program) s 12 r (or) s 12 r (set) s 13 r (of) s 12 r (programs) s 13 r (which) s 12 r (crash) s 13 r (two-third) s -1 r 115 c 46 2667 p (of) s 16 r (the) s 16 r (existing) s 15 r (Sun) s 16 r 87 c -2 r (orkstati) s -1 r (ons) s 15 r (or) s 16 r (other) s 16 r (machines) s 46 2717 p (implementing) s 9 r (Sun') s -1 r 115 c 10 r (Network) s 10 r (Filesystem) s 11 r (\(NFS\).) s 12 r (This) s 1095 96 p (is) s 13 r (serious) s 12 r (since) s 13 r (such) s 13 r (machines) s 13 r (are) s 13 r (the) s 13 r (most) s 12 r (common) s 1095 146 p (computers) s 15 r (connected) s 15 r (to) s 14 r (the) s 14 r (Internet.) s 26 r (Also,) s 15 r (the) s 15 r (total) s 1095 196 p (lack) s 16 r (of) s 14 r (authentication) s 13 r (and) s 15 r (authorization) s 13 r (for) s 14 r (network) s 1095 246 p (level) s 11 r (routing) s 9 r (makes) s 11 r (it) s 10 r (possible) s 10 r (for) s 10 r (an) s 11 r (ordinary) s 9 r (user) s 11 r (to) s 1095 295 p (disrupt) s 6 r (communications) s 6 r (for) s 7 r 97 c 7 r (lar) s (ge) s 6 r (portion) s 5 r (of) s 7 r (the) s 6 r (Inter-) s 1095 345 p (net.) s 14 r (Both) s 6 r (tasks) s 7 r (could) s 7 r (be) s 8 r (easily) s 8 r (done) s 7 r (in) s 7 r 97 c 8 r (manner) s 8 r (which) s 1095 395 p (makes) s 13 r (tracking) s 10 r (down) s 11 r (the) s 11 r (initiator) s 9 r (extremely) s 11 r (dif) s 174 c (cult,) s 1095 445 p (if) s 10 r (not) s 10 r (impossible.) s cmsy10.300 @sf 1054 522 p 15 c t-rom.300 @sf 20 r 65 c 13 r (central) s 13 r (security) s 12 r 174 c 120 c 12 r (repository) s 11 r (may) s 13 r (be) s 13 r 97 c 13 r (good) s 12 r (idea.) s 1095 572 p 86 c -4 r (endors) s t-ita.300 @sf 11 r (must) s t-rom.300 @sf 12 r (participate.) s 17 r (End) s 12 r (users,) s 13 r (who) s 11 r (likely) s 11 r (only) s 1095 622 p (want) s 13 r (to) s 12 r (get) s 13 r (their) s 12 r (work) s 12 r (done,) s 13 r (must) s 13 r (be) s 13 r (educated) s 13 r (about) s 1095 672 p (the) s 11 r (importance) s 10 r (of) s 10 r (installin) s -1 r 103 c 9 r (security) s 9 r 174 c (xes.) s cmsy10.300 @sf 1054 749 p 15 c t-rom.300 @sf 20 r (Knee-jerk) s 10 r (reactions) s 10 r (should) s 9 r (be) s 10 r (avoided.) s 13 r (Openness) s 11 r (and) s 1095 799 p (free) s 9 r 175 c (ow) s 8 r (of) s 8 r (information) s 6 r (is) s 8 r (the) s 8 r (whole) s 7 r (point) s 7 r (of) s 8 r (network-) s 1095 849 p (ing,) s 9 r (and) s 9 r (funding) s 6 r (agencies) s 10 r (should) s 7 r (not) s 8 r (be) s 9 r (encouraged) s 9 r (to) s 1095 899 p (do) s 7 r (anything) s 6 r (damaging) s 7 r (to) s 7 r (this) s 7 r (without) s 5 r (very) s 7 r (careful) s 8 r (con-) s 1095 948 p (sideration.) s 19 r (Network) s 12 r (connectivity) s 10 r (proved) s 12 r (its) s 12 r (worth) s 11 r (as) s 1095 998 p (an) s 9 r (aid) s 8 r (to) s 8 r (collaboration) s 6 r (by) s 8 r (playing) s 7 r (an) s 9 r (invaluable) s 7 r (role) s 8 r (in) s 1095 1048 p (the) s 13 r (defense) s 14 r (and) s 12 r (analysis) s 13 r (ef) s (forts) s 11 r (during) s 11 r (the) s 13 r (crisis,) s 13 r (de-) s 1095 1098 p (spite) s 10 r (the) s 10 r (sites) s 11 r (which) s 9 r (isolated) s 10 r (themselves.) s t-bol.420 @sf 1012 1235 p 52 c 59 r (Acknowledgments) s t-rom.300 @sf 1012 1328 p (Many) s 7 r (people) s 7 r (contributed) s 5 r (to) s 7 r (our) s 6 r (ef) s (fort) s 6 r (to) s 6 r (take) s 7 r (apart) s 7 r (the) s 7 r (virus.) s 1012 1378 p 87 c -2 r 101 c 11 r (would) s 9 r (like) s 11 r (to) s 10 r (thank) s 10 r (them) s 11 r (all) s 11 r (for) s 10 r (their) s 10 r (help) s 10 r (and) s 11 r (insights) s 1012 1427 p (both) s 10 r (during) s 8 r (the) s 11 r (immediate) s 10 r (crisis) s 10 r (and) s 10 r (afterwards.) s t-bol.360 @sf 1012 1543 p (4.1) s 51 r (The) s 19 r (MIT) s 19 r (team) s t-rom.300 @sf 1012 1621 p (The) s 19 r (MIT) s 19 r (group) s 17 r (ef) s (fort) s 16 r (encompassed) s 20 r (many) s 19 r (or) s (ganization) s -1 r 115 c 1012 1671 p (within) s 6 r (the) s 7 r (Institute.) s 11 r (It) s 7 r (included) s 6 r (people) s 7 r (from) s 7 r (Project) s 7 r (Athena,) s 1012 1721 p (the) s 7 r 84 c -2 r (elecommunications) s 7 r (Network) s 6 r (Group,) s 7 r (the) s 7 r (Student) s 6 r (Infor-) s 1012 1771 p (mation) s 10 r (Processing) s 11 r (Board) s 10 r (\(SIPB\),) s 10 r (the) s 11 r (Laboratory) s 10 r (for) s 10 r (Com-) s 1012 1820 p (puter) s 10 r (Science,) s 12 r (and) s 10 r (the) s 10 r (Media) s 11 r (Laboratory) s -2 r 46 c 1054 1870 p (The) s 10 r (SIPB') s -1 r 115 c 9 r (role) s 9 r (is) s 9 r (quite) s 9 r (interesting.) s 13 r (It) s 9 r (is) s 9 r 97 c 11 r (volunteer) s 8 r (stu-) s 1012 1920 p (dent) s 13 r (or) s (ganization) s 11 r (that) s 12 r (represents) s 13 r (students) s 12 r (on) s 13 r (issues) s 13 r (of) s 13 r (the) s 1012 1970 p (MIT) s 12 r (computing) s 10 r (environment,) s 11 r (does) s 11 r (software) s 12 r (development,) s 1012 2020 p (provides) s 15 r (consulting) s 14 r (to) s 15 r (the) s 16 r (community) s -2 r 44 c 15 r (and) s 16 r (other) s 15 r (miscel-) s 1012 2069 p (laneous) s 15 r (tasks.) s 28 r (Almost) s 14 r (all) s 14 r (the) s 15 r (members) s 16 r (of) s 14 r (the) s 15 r (MIT) s 15 r (team) s 1012 2119 p (which) s 11 r (took) s 9 r (apart) s 11 r (the) s 10 r (virus) s 10 r (were) s 11 r (members) s 12 r (of) s 10 r (the) s 11 r (SIPB,) s 11 r (and) s 1012 2169 p (the) s 8 r (SIPB) s 7 r (of) s 174 c (ce) s 8 r (was) s 8 r (the) s 7 r (focus) s 8 r (for) s 7 r (early) s 7 r (ef) s (forts) s 7 r (at) s 7 r (virus) s 7 r (catch-) s 1012 2219 p (ing) s 10 r (until) s 8 r (people) s 10 r (gathered) s 11 r (in) s 9 r (the) s 11 r (Project) s 10 r (Athena) s 10 r (of) s 174 c (ces.) s 1054 2269 p (Mark) s 13 r 87 c -3 r 46 c 12 r (Eichin) s 12 r (\(Athena) s 12 r (and) s 13 r (SIPB\)) s 12 r (and) s 13 r (Stanley) s 12 r (R.) s 13 r (Za-) s 1012 2319 p (narotti) s 6 r (\(LCS) s 7 r (and) s 7 r (SIPB\)) s 7 r (led) s 7 r (the) s 6 r (team) s 8 r (disassembling) s 7 r (the) s 6 r (virus) s 1012 2368 p (code.) s 17 r (The) s 11 r (team) s 12 r (included) s 10 r (Bill) s 9 r (Sommerfeld) s 11 r (\(Athena/Apollo) s 1012 2418 p (Computer) s 11 r (and) s 12 r (SIPB\),) s 11 r 84 c -2 r (ed) s 11 r 89 c -4 r 46 c 11 r 84 c -2 r (s'o) s 11 r (\(Athena) s 11 r (and) s 11 r (SIPB\),) s 12 r (Jon) s 1012 2468 p (Rochlis) s 13 r (\(T) s -2 r (elecommunications) s 12 r (Network) s 12 r (Group) s 12 r (and) s 14 r (SIPB\),) s 1012 2518 p (Ken) s 17 r (Raeburn) s 16 r (\(Athena) s 17 r (and) s 16 r (SIPB\),) s 17 r (Hal) s 16 r (Birkeland) s 16 r (\(Media) s 1012 2568 p (Laboratory\),) s 10 r (and) s 11 r (John) s 10 r 84 c -2 r 46 c 10 r (Kohl) s 9 r (\(Athena/DEC) s 10 r (and) s 10 r (SIPB\).) s 1054 2617 p (Jef) s (frey) s 15 r (I.) s 16 r (Schiller) s 14 r (\(Campus) s 16 r (Network) s 15 r (Manager) s -1 r 44 c 17 r (Athena) s 1012 2667 p (Operations) s 12 r (Manager) s -1 r 44 c 14 r (and) s 13 r (SIPB\)) s 12 r (did) s 12 r 97 c 14 r (lot) s 11 r (of) s 13 r (work) s 12 r (in) s 12 r (trap-) s 1012 2717 p (ping) s 10 r (the) s 11 r (virus,) s 10 r (setting) s 9 r (up) s 11 r (an) s 11 r (isolated) s 9 r (test) s 11 r (suite,) s 11 r (and) s 10 r (dealing) s 965 2842 p 55 c @eop 8 @bop0 8 @bop1 t-rom.300 @sf -36 96 p (with) s 10 r (the) s 13 r (media.) s 23 r (Pascal) s 14 r (Chesnais) s 13 r (\(Media) s 13 r (Laboratory\)) s 12 r (was) s -36 146 p (one) s 13 r (of) s 15 r (the) s 14 r 174 c (rst) s 14 r (at) s 15 r (MIT) s 15 r (to) s 14 r (spot) s 14 r (the) s 14 r (virus.) s 27 r (Ron) s 14 r (Hof) s (fmann) s -36 196 p (\(Network) s 7 r (Group\)) s 9 r (was) s 10 r (one) s 10 r (of) s 10 r (the) s 9 r 174 c (rst) s 10 r (to) s 9 r (notice) s 9 r (an) s 10 r (MIT) s 10 r (ma-) s -36 246 p (chine) s 9 r (attacked) s 10 r (by) s 10 r 174 c (nger) s -1 r 46 c 4 295 p 84 c (im) s 6 r (Shepard) s 7 r (\(LCS\)) s 7 r (provided) s 5 r (information) s 5 r (about) s 7 r (the) s 7 r (prop-) s -36 345 p (agation) s 5 r (of) s 8 r (the) s 7 r (virus,) s 8 r (as) s 8 r (well) s 7 r (as) s 8 r (lar) s (ge) s 7 r (amounts) s 7 r (of) s 7 r 96 c -2 r (`netwatch') s -2 r 39 c -36 395 p (data) s 9 r (and) s 10 r (other) s 10 r (technical) s 10 r (help.) s 4 445 p (James) s 12 r (D.) s 10 r (Bruce) s 11 r (\(EECS) s 10 r (Professor) s 10 r (and) s 10 r 86 c -1 r (ice) s 9 r (President) s 10 r (for) s -36 495 p (Infor) s -1 r (mation) s 8 r (Systems\)) s 11 r (and) s 11 r (the) s 10 r (MIT) s 11 r (News) s 11 r (Of) s 174 c (ce) s 10 r (did) s 10 r (an) s 10 r (ad-) s -36 544 p (mirable) s 7 r (job) s 7 r (of) s 8 r (keeping) s 8 r (the) s 8 r (media) s 9 r (manageable) s 10 r (and) s 8 r (letting) s 7 r (us) s -36 594 p (get) s 9 r (our) s 9 r (work) s 10 r (done.) s t-bol.360 @sf -36 713 p (4.2) s 49 r (The) s 19 r (Berkeley) s 19 r 84 c -4 r (eam) s t-rom.300 @sf -36 790 p 87 c -2 r 101 c 10 r (communicated) s 12 r (and) s 12 r (exchanged) s 13 r (code) s 12 r (with) s 11 r (Berkeley) s 11 r (ex-) s -36 840 p (tensively) s 5 r (througho) s -1 r (ut) s 5 r (the) s 7 r (morning) s 6 r (of) s 6 r 52 c 7 r (November) s 8 r (1988.) s 12 r (The) s -36 890 p (team) s 12 r (there) s 13 r (included) s 12 r (Keith) s 13 r (Bostic) s 12 r (\(Computer) s 12 r (Systems) s 14 r (Re-) s -36 940 p (search) s 16 r (Group,) s 17 r (University) s 15 r (of) s 16 r (Californi) s -1 r (a,) s 17 r (Berkeley\),) s 18 r (Mike) s -36 990 p (Karels) s 10 r (\(Computer) s 11 r (Systems) s 12 r (Research) s 13 r (Group,) s 11 r (University) s 10 r (of) s -36 1040 p (Califo) s -1 r (rni) s -1 r (a,) s 7 r (Berkeley\),) s 8 r (Phil) s 7 r (Lapsley) s 8 r (\(Experimental) s 7 r (Comput-) s -36 1089 p (ing) s 6 r (Facility) s -2 r 44 c 8 r (University) s 7 r (of) s 9 r (California,) s 8 r (Berkeley\),) s 9 r (Dave) s 10 r (Pare) s -36 1139 p (\(FX) s 6 r (Development,) s 8 r (Inc.\),) s 9 r (Donn) s 7 r (Seeley) s 9 r (\(University) s 5 r (of) s 8 r (Utah\),) s -36 1189 p (Chri) s -1 r 115 c 11 r 84 c -2 r (orek) s 11 r (\(University) s 10 r (of) s 12 r (Maryland\),) s 12 r (and) s 12 r (Peter) s 13 r 89 c -3 r (ee) s 12 r (\(Ex-) s -36 1239 p (perimental) s 15 r (Computing) s 15 r (Facility) s -2 r 44 c 18 r (University) s 15 r (of) s 17 r (California,) s -36 1289 p (Berkeley\).) s t-bol.360 @sf -36 1407 p (4.3) s 49 r (Others) s t-rom.300 @sf -36 1485 p (Numerous) s 10 r (others) s 11 r (across) s 12 r (the) s 11 r (country) s 10 r (deserve) s 12 r (thanks;) s 11 r (many) s -36 1535 p (of) s 16 r (them) s 19 r (worked) s 18 r (directly) s 17 r (or) s 18 r (indirectly) s 16 r (on) s 18 r (the) s 18 r (virus,) s 20 r (and) s -36 1584 p (helped) s 6 r (coordinate) s 7 r (the) s 7 r (spread) s 8 r (of) s 7 r (information.) s 11 r (Special) s 8 r (thanks) s -36 1634 p (shoul) s -1 r 100 c 6 r (go) s 7 r (to) s 7 r (Gene) s 8 r (Spaf) s (ford) s 6 r (\(Purdue\)) s 7 r (for) s 7 r (serving) s 7 r (as) s 8 r 97 c 9 r (central) s -36 1684 p (info) s -1 r (rmation) s 8 r (point) s 9 r (and) s 11 r (providin) s -1 r 103 c 9 r (key) s 10 r (insight) s 9 r (into) s 9 r (the) s 10 r (work-) s -36 1734 p (ings) s 6 r (of) s 8 r (the) s 9 r (virus.) s 12 r (Don) s 8 r (Becker) s 9 r (\(Harris) s 8 r (Corporation\)) s 6 r (has) s 9 r (pro-) s -36 1784 p (vided) s 11 r (the) s 12 r (most) s 13 r (readable) s 13 r (decompilation) s 12 r (of) s 12 r (the) s 13 r (virus) s 12 r (which) s -36 1834 p (we) s 9 r (have) s 11 r (seen) s 11 r (to) s 10 r (date.) s 14 r (It) s 10 r (was) s 11 r (most) s 10 r (helpful.) s 4 1883 p (People) s 8 r (who) s 7 r (of) s (fered) s 7 r (particularly) s 6 r (valuable) s 7 r (advice) s 9 r (included) s -36 1933 p (Judit) s -1 r 104 c 7 r (Provost,) s 8 r (Jennifer) s 8 r (Steiner) s -1 r 44 c 9 r (Mary) s 8 r 86 c -4 r (ogt,) s 7 r (Stan) s 9 r (Zanarotti,) s -36 1983 p (Jon) s 6 r (Kamens,) s 9 r (Marc) s 8 r (Horowitz,) s 7 r (Jenifer) s 8 r 84 c (idwell,) s 6 r (James) s 9 r (Bruce,) s -36 2033 p (Jerry) s 15 r (Saltzer) s -1 r 44 c 19 r (Steve) s 17 r (Dyer) s -1 r 44 c 18 r (Ron) s 16 r (Hof) s (fmann) s 15 r (and) s 17 r (many) s 17 r (un-) s -36 2083 p (named) s 10 r (people) s 11 r (from) s 11 r (the) s 11 r (SIPB) s 10 r (Of) s 174 c (ce.) s 17 r (Any) s 10 r (remaining) s 11 r 175 c (aws) s -36 2132 p (in) s 8 r (this) s 10 r (paper) s 10 r (are) s 11 r (our) s 10 r (fault,) s 10 r (not) s 9 r (theirs.) s 4 2182 p (Special) s 11 r (thanks) s 11 r (to) s 10 r (Bill) s 10 r (Sommerfeld) s 11 r (for) s 11 r (providing) s 9 r (the) s 10 r (de-) s -36 2232 p (scripti) s -1 r (on) s 8 r (of) s 10 r (the) s 10 r 174 c (nger) s 10 r (attack) s 11 r 46 c 965 2842 p 56 c @eop 9 @bop0 cmr6.300 @sf [<1F003F8070C060E0E0E0E0E0E0E0F0E0FFC0FF80E200600071C039C01FC00780> 11 16 -1 0 15] 54 @dc 9 @bop1 t-bol.420 @sf -36 96 p 65 c 57 r (The) s 22 r (Pr) s (ogram) s t-rom.300 @sf -36 190 p (This) s 11 r (Appendix) s 12 r (describes) s 14 r (the) s 13 r (virus) s 12 r (program) s 13 r (subroutin) s -1 r 101 c 12 r (by) s -36 240 p (subrou) s -1 r (tin) s -1 r (e.) s 20 r (For) s 13 r (reference,) s 15 r (the) s 13 r 175 c (ow) s 12 r (of) s 13 r (information) s 10 r (among) s -36 289 p (the) s 9 r (subroutin) s -1 r (es) s 9 r (is) s 10 r (shown) s 10 r (in) s 10 r (Figure) s 10 r (1.) s t-bol.360 @sf -36 411 p (A.1) s 49 r (Names) s t-rom.300 @sf -36 490 p (The) s 12 r (core) s 14 r (of) s 13 r (the) s 13 r (virus) s 12 r (is) s 13 r 97 c 14 r (pair) s 13 r (of) s 12 r (binary) s 13 r (modules,) s 14 r (one) s 13 r (for) s -36 539 p (the) s 14 r 86 c -4 r (AX) s 14 r (architecture) s 15 r (and) s 15 r (the) s 16 r (other) s 14 r (for) s 15 r (the) s 15 r (Sun) s 15 r (architec-) s -36 589 p (ture.) s 13 r (These) s 12 r (are) s 12 r (linkable) s 9 r (modules,) s 11 r (and) s 11 r (thus) s 10 r (have) s 11 r (name) s 12 r (lists) s -36 639 p (for) s 11 r (their) s 12 r (internal) s 12 r (procedures.) s 23 r (Many) s 13 r (of) s 12 r (the) s 13 r (original) s 11 r (names) s -36 689 p (are) s 10 r (included) s 9 r (here) s 11 r (with) s 9 r (the) s 10 r (descriptions) s 10 r (of) s 10 r (the) s 10 r (functions) s 9 r (the) s -36 739 p (rout) s -1 r (ines) s 9 r (performed.) s 4 789 p (It) s 8 r (is) s 9 r (surprising) s 7 r (that) s 8 r (the) s 9 r (names) s 10 r (are) s 10 r (included,) s 9 r (and) s 9 r (astonish-) s -36 839 p (ing) s 5 r (that) s 8 r (they) s 7 r (are) s 9 r (meaningful.) s 12 r (Some) s 8 r (simple) s 8 r (techniques,) s 8 r (such) s -36 889 p (as) s 9 r (randomizing) s 9 r (the) s 10 r (procedure) s 10 r (names,) s 11 r (would) s 9 r (have) s 10 r (removed) s -36 938 p 97 c 10 r (number) s 9 r (of) s 10 r (clues) s 11 r (to) s 10 r (the) s 10 r (function) s 9 r (of) s 10 r (the) s 10 r (virus.) s t-bol.360 @sf -36 1060 p (A.2) s 49 r (main) s t-rom.300 @sf -36 1139 p (The) s 8 r (main) s 9 r (module,) s 9 r (the) s 9 r (starting) s 8 r (point) s 7 r (of) s 9 r (any) s 9 r 67 c 8 r (language) s 9 r (pro-) s -36 1188 p (gram,) s 8 r (does) s 9 r (some) s 9 r (initiali) s -1 r (zation,) s 7 r (processes) s 10 r (its) s 8 r (command) s 9 r (line,) s -36 1238 p (and) s 12 r (then) s 12 r (goes) s 13 r (of) s 102 c 12 r (into) s 12 r (the) s 13 r (loop) s 11 r (which) s 13 r (or) s (ganizes) s 12 r (all) s 13 r (of) s 13 r (the) s -36 1288 p (real) s 9 r (work.) s t-bol.300 @sf -36 1401 p (A.2.1) s 40 r (Initialization) s t-rom.300 @sf -36 1480 p (The) s 8 r (program) s 8 r 174 c (rst) s 9 r (takes) s 9 r (some) s 9 r (steps) s 9 r (to) s 9 r (hide) s 8 r (itself.) s 13 r (It) s 8 r (changes) s -36 1530 p (the) s 10 r 96 c -2 r (`zeroth') s -3 r 39 c 10 r (ar) s (gument,) s 12 r (which) s 11 r (is) s 12 r (the) s 11 r (process) s 13 r (name,) s 13 r (to) s c-med.300 @sf 11 r (sh) s t-rom.300 @sf 46 c -36 1580 p (Thus,) s 15 r (no) s 14 r (matter) s 15 r (how) s 14 r (the) s 15 r (program) s 14 r (was) s 16 r (invoked,) s 15 r (it) s 14 r (would) s -36 1630 p (show) s 14 r (up) s 15 r (in) s 15 r (the) s 15 r (process) s 17 r (table) s 15 r (with) s 14 r (the) s 16 r (same) s 17 r (name) s 16 r (as) s 17 r (the) s -36 1679 p (Bourn) s -1 r 101 c 9 r (Shell,) s 10 r 97 c 11 r (program) s 10 r (which) s 10 r (often) s 10 r (runs) s 9 r (legitimately) s -2 r 46 c 4 1730 p (The) s 14 r (program) s 12 r (also) s 13 r (sets) s 13 r (the) s 13 r (maximum) s 14 r (core) s 13 r (dump) s 13 r (size) s 13 r (to) s -36 1779 p (zero) s 12 r (blocks.) s 20 r (If) s 12 r (the) s 13 r (program) s 12 r (crashed) s cmr7.300 @sf 569 1765 p 54 c t-rom.300 @sf 601 1779 p (it) s 12 r (would) s 11 r (not) s 12 r (leave) s 13 r 97 c -36 1829 p (core) s 14 r (dump) s 14 r (behind) s 14 r (to) s 14 r (help) s 15 r (investigators.) s 26 r (It) s 14 r (also) s 15 r (turns) s 14 r (of) s 102 c -36 1879 p (handli) s -1 r (ng) s 7 r (of) s 8 r (write) s 8 r (errors) s 9 r (on) s 8 r (pipes,) s 9 r (which) s 8 r (normally) s 8 r (cause) s 10 r (the) s -36 1929 p (progr) s -1 r (am) s 10 r (to) s 9 r (exit.) s 4 1979 p (The) s 12 r (next) s 11 r (step) s 11 r (is) s 11 r (to) s 11 r (read) s 12 r (the) s 11 r (clock,) s 12 r (store) s 11 r (the) s 11 r (current) s 11 r (time) s -36 2029 p (in) s 11 r 97 c 14 r (local) s 13 r (variable,) s 14 r (and) s 14 r (use) s 14 r (that) s 12 r (value) s 14 r (to) s 12 r (seed) s 15 r (the) s 13 r (random) s -36 2079 p (number) s 9 r (generator) s -1 r 46 c t-bol.300 @sf -36 2192 p (A.2.2) s 40 r (Command) s 15 r (line) s 15 r (argument) s 16 r (pr) s (ocessing) s t-rom.300 @sf -36 2271 p (The) s 16 r (virus) s 16 r (program) s 17 r (itself) s 16 r (takes) s 18 r (an) s 17 r (optional) s 15 r (ar) s (gument) s c-med.300 @sf 17 r (-p) s t-rom.300 @sf -36 2321 p (which) s 6 r (must) s 9 r (be) s 8 r (followed) s 7 r (by) s 8 r 97 c 9 r (decimal) s 9 r (number) s -1 r 44 c 8 r (which) s 8 r (seems) s -36 2370 p (to) s 11 r (be) s 13 r 97 c 13 r (process) s 13 r (id) s 12 r (of) s 13 r (the) s 12 r (parent) s 13 r (which) s 12 r (spawned) s 13 r (it.) s 21 r (It) s 12 r (uses) s -36 2420 p (thi) s -1 r 115 c 7 r (number) s 9 r (later) s 9 r (to) s 8 r (kill) s 7 r (that) s 8 r (process,) s 10 r (probably) s 8 r (to) s 8 r 96 c -2 r (`close) s 8 r (the) s -36 2470 p (door) s 1 r 39 c -3 r 39 c 8 r (behind) s 9 r (it.) s 4 2520 p (The) s 19 r (rest) s 19 r (of) s 18 r (the) s 18 r (command) s 20 r (line) s 17 r (ar) s (guments) s 18 r (are) s 19 r 96 c -2 r (`object) s -36 2570 p (names') s -2 r ('.) s 25 r (These) s 16 r (are) s 15 r (names) s 16 r (of) s 14 r 174 c (les) s 14 r (it) s 14 r (tries) s 14 r (to) s 14 r (load) s 14 r (into) s 13 r (its) s -36 2599 p 390 2 ru cmr6.300 @sf 5 2627 p 54 c t-rom.240 @sf 22 2638 p (For) s 9 r (example,) s 8 r (the) s 8 r (virus) s 8 r (was) s 8 r (originally) s 8 r (compiled) s 7 r (using) s 8 r (4.3BSD) s 8 r (decla-) s -36 2678 p (ration) s 5 r 174 c (les.) s 11 r (Under) s 6 r (4.2BSD,) s 8 r (the) s 6 r (alias) s 7 r (name) s 6 r (list) s 8 r (did) s 6 r (not) s 7 r (exist,) s 7 r (and) s 6 r (code) s 6 r (such) s -36 2717 p (as) s 7 r (the) s 7 r (virus) s 8 r (which) s 8 r (assumes) s 7 r (aliases) s 7 r (are) s 8 r (there) s 8 r (can) s 7 r (crash) s 8 r (and) s 7 r (dump) s 7 r (core.) s t-rom.300 @sf 1012 96 p (address) s 13 r (space.) s 22 r (If) s 11 r (it) s 12 r (can') s 116 c 11 r (load) s 12 r (one) s 12 r (of) s 12 r (them,) s 14 r (it) s 11 r (quits.) s 19 r (If) s 12 r (the) s c-med.300 @sf 1012 146 p (-p) s t-rom.300 @sf 14 r (ar) s (gument) s 13 r (is) s 14 r (given,) s 15 r (it) s 13 r (also) s 14 r (deletes) s 14 r (the) s 14 r (object) s 13 r 174 c (les,) s 16 r (and) s 1012 196 p (later) s 8 r (tries) s 8 r (to) s 7 r (remove) s 8 r (the) s 8 r (disk) s 7 r (image) s 9 r (of) s 7 r (running) s 7 r (virus,) s 7 r (as) s 9 r (well) s 1012 246 p (as) s 12 r (the) s 11 r 174 c (le) s c-med.300 @sf 12 r (/tmp/.dumb) s t-rom.300 @sf 46 c 16 r (\(This) s 11 r 174 c (le) s 11 r (is) s 11 r (not) s 10 r (referenced) s 13 r (any-) s 1012 295 p (where) s 11 r (else) s 11 r (in) s 10 r (the) s 10 r (virus,) s 10 r (so) s 10 r (it) s 9 r (is) s 11 r (unclear) s 10 r (why) s 10 r (it) s 9 r (is) s 10 r (deleted.\)) s 1054 347 p (The) s 8 r (program) s 6 r (then) s 7 r (tried) s 6 r 97 c 7 r (few) s 8 r (further) s 6 r (steps,) s 8 r (exiting) s 5 r (\(`) s -2 r (`bail-) s 1012 397 p (ing) s 10 r (out') s -2 r ('\)) s 8 r (if) s 9 r (any) s 11 r (of) s 10 r (them) s 10 r (failed:) s cmsy10.300 @sf 1054 448 p 15 c t-rom.300 @sf 20 r (It) s 9 r (checked) s 11 r (that) s 9 r (it) s 9 r (had) s 9 r (been) s 10 r (given) s 9 r (at) s 10 r (least) s 9 r (one) s 10 r (object) s 9 r (on) s 1095 498 p (the) s 11 r (command) s 11 r (line.) s cmsy10.300 @sf 1054 548 p 15 c t-rom.300 @sf 20 r (It) s 14 r (checked) s 15 r (to) s 13 r (see) s 15 r (if) s 14 r (it) s 13 r (had) s 14 r (successfully) s 14 r (loaded) s 13 r (in) s 14 r (the) s 1095 598 p (object) s c-med.300 @sf 10 r (l1.c) s t-rom.300 @sf 46 c 1054 649 p (If) s 12 r (the) s 13 r 96 c -2 r (`-p') s -4 r 39 c 11 r (ar) s (gument) s 11 r (was) s 14 r (given,) s 12 r (the) s 13 r (program) s 12 r (closes) s 13 r (all) s 1012 699 p 174 c (le) s 14 r (descriptors,) s 13 r (in) s 13 r (case) s 15 r (there) s 13 r (are) s 14 r (any) s 13 r (connections) s 13 r (open) s 13 r (to) s 1012 749 p (the) s 11 r (parent.) s 1054 801 p (The) s 8 r (program) s 7 r (then) s 7 r (erases) s 9 r (the) s 7 r (text) s 7 r (of) s 7 r (the) s 8 r (ar) s (gument) s 6 r (array) s -2 r 44 c 8 r (to) s 1012 851 p (further) s 7 r (obscure) s 8 r (how) s 8 r (it) s 7 r (was) s 8 r (started) s 8 r (\(perhaps) s 8 r (to) s 7 r (hide) s 7 r (anything) s 1012 900 p (if) s 10 r (one) s 11 r (were) s 11 r (to) s 9 r (get) s 10 r 97 c 11 r (core) s 11 r (image) s 11 r (of) s 10 r (the) s 10 r (running) s 8 r (virus.\)) s 1054 952 p (It) s 8 r (scans) s 9 r (all) s 8 r (of) s 8 r (the) s 8 r (network) s 7 r (interfaces) s 9 r (on) s 8 r (the) s 8 r (machine,) s 10 r (gets) s 1012 1002 p (the) s 12 r 175 c (ags) s 11 r (and) s 12 r (addresses) s 12 r (of) s 11 r (each) s 12 r (interface.) s 18 r (It) s 10 r (tries) s 11 r (to) s 11 r (get) s 11 r (the) s 1012 1052 p (point-to-po) s -1 r (int) s 11 r (address) s 14 r (of) s 14 r (the) s 13 r (interface,) s 15 r (skipping) s 12 r (the) s 14 r (loop-) s 1012 1101 p (back) s 15 r (address.) s 25 r (It) s 14 r (also) s 14 r (stores) s 14 r (the) s 13 r (netmask) s 15 r (for) s 13 r (that) s 13 r (network) s 1012 1151 p 91 c (19) s (].) s 1054 1203 p (Finally) s -2 r 44 c 8 r (it) s 8 r (kills) s 8 r (of) s 102 c 8 r (the) s 9 r (process) s 10 r (id) s 8 r (given) s 9 r (with) s 8 r (the) s 9 r 96 c -2 r (`-p') s -3 r 39 c 7 r (op-) s 1012 1253 p (tion.) s 24 r (It) s 14 r (also) s 13 r (changes) s 15 r (the) s 14 r (current) s 14 r (process) s 14 r (group,) s 14 r (so) s 14 r (that) s 13 r (it) s 1012 1302 p (doesn') s 116 c 10 r (die) s 11 r (when) s 11 r (the) s 11 r (parent) s 10 r (exits.) s 16 r (Once) s 12 r (this) s 10 r (is) s 11 r (cleaned) s 12 r (up,) s 1012 1352 p (it) s 12 r (falls) s 12 r (into) s 11 r (the) s t-ita.300 @sf 12 r (doit) s t-rom.300 @sf 11 r (routine) s 11 r (which) s 11 r (performs) s 12 r (the) s 13 r (rest) s 12 r (of) s 12 r (the) s 1012 1402 p (work.) s t-bol.360 @sf 1012 1531 p (A.3) s 51 r (doit) s 18 r 114 c (outine) s t-rom.300 @sf 1012 1612 p (This) s 11 r (routine) s 9 r (is) s 10 r (where) s 10 r (the) s 11 r (program) s 10 r (spends) s 10 r (most) s 10 r (of) s 10 r (its) s 10 r (time.) s t-bol.300 @sf 1012 1732 p (A.3.1) s 42 r (Initializatio) s -1 r 110 c t-rom.300 @sf 1012 1813 p (Like) s 7 r (the) s 7 r (main) s 7 r (routine,) s 7 r (it) s 6 r (seeds) s 8 r (the) s 6 r (random) s 7 r (number) s 7 r (generator) s 1012 1863 p (with) s 11 r (the) s 12 r (clock,) s 12 r (and) s 12 r (stores) s 11 r (the) s 12 r (clock) s 12 r (value) s 11 r (to) s 12 r (later) s 11 r (measure) s 1012 1913 p (how) s 10 r (long) s 10 r (the) s 10 r (virus) s 9 r (has) s 11 r (been) s 10 r (running) s 9 r (on) s 10 r (this) s 9 r (system.) s 1054 1964 p (It) s 9 r (then) s 8 r (tries) s t-ita.300 @sf 9 r (hg) s t-rom.300 @sf 46 c 13 r (If) s 9 r (that) s 9 r (fails,) s 9 r (it) s 8 r (tries) s t-ita.300 @sf 9 r (hl) s t-rom.300 @sf 46 c 13 r (If) s 9 r (that) s 8 r (fails,) s 10 r (it) s 8 r (tries) s t-ita.300 @sf 1012 2014 p (ha) s t-rom.300 @sf 46 c 1054 2066 p (It) s 8 r (then) s 8 r (tries) s 8 r (to) s 8 r (check) s 9 r (if) s 8 r (there) s 8 r (is) s 8 r (already) s 9 r 97 c 9 r (copy) s 8 r (of) s 8 r (the) s 8 r (virus) s 1012 2116 p (running) s 9 r (on) s 10 r (this) s 9 r (machine.) s 15 r (Errors) s 11 r (in) s 9 r (this) s 10 r (code) s 11 r (contributed) s 8 r (to) s 1012 2165 p (the) s 12 r (lar) s (ge) s 11 r (amounts) s 12 r (of) s 11 r (computer) s 12 r (time) s 12 r (taken) s 12 r (up) s 11 r (by) s 11 r (the) s 12 r (virus.) s 1012 2215 p (Speci) s 174 c (cally:) s cmsy10.300 @sf 1054 2267 p 15 c t-rom.300 @sf 20 r (On) s 10 r 97 c 11 r (one-in-seven) s 9 r (chance,) s 12 r (it) s 9 r (won') s 116 c 8 r (even) s 11 r (try) s 9 r (to) s 9 r (test) s 10 r (for) s 1095 2317 p (another) s 10 r (virus.) s cmsy10.300 @sf 1054 2367 p 15 c t-rom.300 @sf 20 r (The) s 10 r 174 c (rst) s 9 r (copy) s 9 r (of) s 9 r (the) s 10 r (virus) s 8 r (to) s 9 r (run) s 8 r (is) s 9 r (the) s 9 r (only) s 9 r (one) s 9 r (which) s 1095 2416 p (listens) s 10 r (for) s 10 r (others;) s 10 r (if) s 10 r (multiple) s 9 r (infections) s 9 r (occur) s 11 r 96 c -2 r (`simul-) s 1095 2466 p (taneously') s -2 r 39 c 6 r (they) s 8 r (will) s 6 r (not) s 7 r 96 c -2 r (`hear) s 2 r 39 c -2 r 39 c 5 r (each) s 9 r (other) s -1 r 44 c 8 r (and) s 8 r (all) s 7 r (but) s 1095 2516 p (one) s 11 r (will) s 9 r (fail) s 9 r (to) s 10 r (listen) s 9 r (\(see) s 12 r (section) s 10 r (A.12\).) s 1054 2568 p (The) s 20 r (remainder) s 19 r (of) s 19 r (the) s 18 r (initializatio) s -1 r 110 c 17 r (routine) s 18 r (seems) s 20 r (de-) s 1012 2617 p (signed) s 20 r (to) s 20 r (send) s 20 r 97 c 21 r (single) s 20 r (byte) s 20 r (to) s 19 r (address) s 21 r (128.32.137.13,) s 1012 2667 p (which) s 8 r (is) s t-ita.300 @sf 8 r (ernie.berkeley) s -1 r (.edu) s t-rom.300 @sf 44 c 10 r (on) s 8 r (port) s 7 r 49 c -1 r (1357.) s 11 r (This) s 8 r (never) s 9 r (hap-) s 1012 2717 p (pens,) s 15 r (since) s 14 r (the) s 14 r (author) s 12 r (used) s 14 r (the) s t-ita.300 @sf 13 r (sendto) s t-rom.300 @sf 13 r (function) s 12 r (on) s 13 r 97 c 14 r (TCP) s 965 2842 p 57 c @eop 10 @bop0 10 @bop1 -36 2501 p @beginspecial -36.000000 @hoffset -108.000000 @voffset @setspecial %!PS-Adobe- %%DocumentFonts: Courier %%Pages: 1 %%BoundingBox: 23 88 1279 675 %%EndComments .86 1 scale 40 0 translate /arrowheight 8 def /arrowwidth 4 def /none null def /numgraphicparameters 10 def /Begin { save numgraphicparameters dict begin } def /End { end restore } def /SetB { dup type /nulltype eq { pop false /brushrightarrow idef false /brushleftarrow idef 1 /brushwidth idef 0 /brushdashoffset idef [] /brushdasharray idef true /brushnone idef } { 0 ne /brushrightarrow idef 0 ne /brushleftarrow idef /brushwidth idef /brushdashoffset idef /brushdasharray idef false /brushnone idef } ifelse } def /SetF { /printsize idef /printfont idef } def /SetP { dup type /nulltype eq { pop -1 /patterngraylevel idef true /patternnone idef } { /patterngraylevel idef false /patternnone idef } ifelse } def /BSpl { 0 begin storexyn newpath 0 0 0 0 0 0 1 1 true subspline n 2 gt { 0 0 0 0 1 1 2 2 false subspline 1 1 n 3 sub { /i exch def i 1 sub dup i dup i 1 add dup i 2 add dup false subspline } for n 3 sub dup n 2 sub dup n 1 sub dup 2 copy false subspline } if n 2 sub dup n 1 sub dup 2 copy 2 copy false subspline patternnone not brushleftarrow not brushrightarrow not and and { ifill } if brushnone not { istroke } if 0 0 1 1 leftarrow n 2 sub dup n 1 sub dup rightarrow end } dup 0 4 dict put def /Circ { newpath 0 360 arc patternnone not { ifill } if brushnone not { istroke } if } def /CBSpl { 0 begin dup 2 gt { storexyn newpath n 1 sub dup 0 0 1 1 2 2 true subspline 1 1 n 3 sub { /i exch def i 1 sub dup i dup i 1 add dup i 2 add dup false subspline } for n 3 sub dup n 2 sub dup n 1 sub dup 0 0 false subspline n 2 sub dup n 1 sub dup 0 0 1 1 false subspline patternnone not { ifill } if brushnone not { istroke } if } { Poly } ifelse end } dup 0 4 dict put def /Elli { 0 begin /savedCTM matrix currentmatrix def newpath 4 2 roll translate scale 0 0 1 0 360 arc savedCTM setmatrix patternnone not { ifill } if brushnone not { istroke } if end } dup 0 1 dict put def /Line { 0 begin 2 storexyn newpath x 0 get y 0 get moveto x 1 get y 1 get lineto brushnone not { istroke } if 0 0 1 1 leftarrow 0 0 1 1 rightarrow end } dup 0 4 dict put def /MLine { 0 begin storexyn newpath x 0 get y 0 get moveto 1 1 n 1 sub { /i exch def x i get y i get lineto } for patternnone not brushleftarrow not brushrightarrow not and and { ifill } if brushnone not { istroke } if 0 0 1 1 leftarrow n 2 sub dup n 1 sub dup rightarrow end } dup 0 4 dict put def /Poly { 3 1 roll newpath moveto -1 add { lineto } repeat closepath patternnone not { ifill } if brushnone not { istroke } if } def /Rect { 0 begin /t exch def /r exch def /b exch def /l exch def newpath l b moveto l t lineto r t lineto r b lineto closepath patternnone not { ifill } if brushnone not { istroke } if end } dup 0 4 dict put def /Text { patternnone not { ishow } { pop } ifelse } def /idef { dup where { pop pop pop } { exch def } ifelse } def /ifill { gsave patterngraylevel setgray eofill grestore } def /istroke { gsave brushdashoffset -1 eq { [] 0 setdash 1 setgray } { brushdasharray brushdashoffset setdash 0 setgray } ifelse brushwidth setlinewidth originalCTM setmatrix stroke grestore } def /ishow { 0 begin gsave 0 2.5 originalCTM dtransform idtransform /yoff exch def /xoff exch def printfont /Courier ne printsize 10 ne and { xoff yoff translate } if printfont findfont printsize scalefont setfont patterngraylevel setgray /vertoffset printsize neg def { 0 vertoffset moveto show /vertoffset vertoffset printsize sub def } forall grestore end } dup 0 3 dict put def /arrowhead { 0 begin transform originalCTM itransform /taily exch def /tailx exch def transform originalCTM itransform /tipy exch def /tipx exch def /dy tipy taily sub def /dx tipx tailx sub def /angle dx 0 ne dy 0 ne or { dy dx atan } { 90 } ifelse def gsave originalCTM setmatrix tipx tipy translate angle rotate newpath 0 0 moveto arrowheight neg arrowwidth 2 div lineto arrowheight neg arrowwidth 2 div neg lineto closepath patternnone not { ifill } if brushnone not { istroke } if grestore end } dup 0 7 dict put def /leftarrow { 0 begin y exch get /taily exch def x exch get /tailx exch def y exch get /tipy exch def x exch get /tipx exch def brushleftarrow { tipx tipy tailx taily arrowhead } if end } dup 0 4 dict put def /rightarrow { 0 begin y exch get /tipy exch def x exch get /tipx exch def y exch get /taily exch def x exch get /tailx exch def brushrightarrow { tipx tipy tailx taily arrowhead } if end } dup 0 4 dict put def /midpoint { 0 begin /y1 exch def /x1 exch def /y0 exch def /x0 exch def x0 x1 add 2 div y0 y1 add 2 div end } dup 0 4 dict put def /thirdpoint { 0 begin /y1 exch def /x1 exch def /y0 exch def /x0 exch def x0 2 mul x1 add 3 div y0 2 mul y1 add 3 div end } dup 0 4 dict put def /subspline { 0 begin /movetoNeeded exch def y exch get /y3 exch def x exch get /x3 exch def y exch get /y2 exch def x exch get /x2 exch def y exch get /y1 exch def x exch get /x1 exch def y exch get /y0 exch def x exch get /x0 exch def x1 y1 x2 y2 thirdpoint /p1y exch def /p1x exch def x2 y2 x1 y1 thirdpoint /p2y exch def /p2x exch def x1 y1 x0 y0 thirdpoint p1x p1y midpoint /p0y exch def /p0x exch def x2 y2 x3 y3 thirdpoint p2x p2y midpoint /p3y exch def /p3x exch def movetoNeeded { p0x p0y moveto } if p1x p1y p2x p2y p3x p3y curveto end } dup 0 17 dict put def /storexyn { /n exch def /y n array def /x n array def n 1 sub -1 0 { /i exch def y i 3 2 roll put x i 3 2 roll put } for } def %%EndProlog %I Idraw 1 gsave [ 0.9 0 0 0.9 0 0 ] concat /originalCTM matrix currentmatrix def grestore Begin %I Pict %I b u %I f u %I p u [0.9 0 0 0.9 0 0] concat %I t 0.9 0 0 0.9 0 0 Begin %I Line [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u 462 581 462 469 Line %I 462 581 462 469 End Begin %I Line [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u 448 581 448 469 Line %I 448 581 448 469 End Begin %I MLine [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u %I 4 336 238 %I 336 238 336 210 %I 336 210 252 210 %I 252 210 252 189 %I 252 189 4 MLine End Begin %I MLine [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u %I 4 259 238 %I 259 238 259 224 %I 259 224 231 224 %I 231 224 231 189 %I 231 189 4 MLine End Begin %I MLine [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u %I 4 175 238 %I 175 238 175 224 %I 175 224 210 224 %I 210 224 210 189 %I 210 189 4 MLine End Begin %I MLine [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u %I 4 70 238 %I 70 238 70 210 %I 70 210 189 210 %I 189 210 189 189 %I 189 189 4 MLine End Begin %I Line [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u 336 350 336 266 Line %I 336 350 336 266 End Begin %I MLine [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u %I 4 154 399 %I 154 399 154 308 %I 154 308 315 308 %I 315 308 315 266 %I 315 266 4 MLine End Begin %I MLine [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u %I 5 126 399 %I 126 399 126 294 %I 126 294 259 294 %I 259 294 259 273 %I 259 273 259 266 %I 259 266 5 MLine End Begin %I MLine [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u %I 4 98 399 %I 98 399 98 280 %I 98 280 175 280 %I 175 280 175 266 %I 175 266 4 MLine End Begin %I Line [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u 70 399 70 266 Line %I 70 399 70 266 End Begin %I Line [] 0 1 1 1 SetB %I b 65535 1 1 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u 483 455 511 455 Line %I 483 455 511 455 End Begin %I Line [] 0 1 1 1 SetB %I b 65535 1 1 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 7 -259] concat %I t 1 0 0 1 7 -259 476 672 504 672 Line %I 476 672 504 672 End Begin %I Line [] 0 1 1 1 SetB %I b 65535 1 1 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 7 -301] concat %I t 1 0 0 1 7 -301 476 672 504 672 Line %I 476 672 504 672 End Begin %I Line [] 0 1 1 1 SetB %I b 65535 1 1 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 0 -42] concat %I t 1 0 0 1 0 -42 357 413 427 413 Line %I 357 413 427 413 End Begin %I Line [] 0 1 1 1 SetB %I b 65535 1 1 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u 357 413 427 413 Line %I 357 413 427 413 End Begin %I Line [] 0 1 1 1 SetB %I b 65535 1 1 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u 427 455 357 455 Line %I 427 455 357 455 End Begin %I Line [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u 406 609 385 658 Line %I 406 609 385 658 End Begin %I Line [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u 483 672 399 672 Line %I 483 672 399 672 End Begin %I Line [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u 448 721 385 686 Line %I 448 721 385 686 End Begin %I Line [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u 336 721 357 686 Line %I 336 721 357 686 End Begin %I Line [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u 77 721 77 658 Line %I 77 721 77 658 End Begin %I Line [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u 203 721 203 658 Line %I 203 721 203 658 End Begin %I Line [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u 371 658 294 539 Line %I 371 658 294 539 End Begin %I Line [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u 357 658 154 539 Line %I 357 658 154 539 End Begin %I Line [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u 203 630 126 539 Line %I 203 630 126 539 End Begin %I Line [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u 84 630 98 539 Line %I 84 630 98 539 End Begin %I Pict %I b u %I f u %I p u %I t u Begin %I Rect [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 [1.73684 0 0 1.2 -162.474 -37.8] concat %I t 1.73684 0 0 1.2 -162.474 -37.8 154 154 287 189 Rect %I 154 154 287 189 End Begin %I Pict %I b u %I f u %I p u [1 0 0 1.03704 -2.5 0.518524] concat %I t 1 0 0 1.03704 -2.5 0.518524 Begin %I Text [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 202 175] concat %I t 1 0 0 1 202 175 %I waithit [ (waithit) ] Text End Begin %I Text [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 112 161] concat %I t 1 0 0 1 112 161 %I (wait for infected client to respond) [ (\(wait for infected client to respond\)) ] Text End End %I eop End %I eop Begin %I Pict %I b u %I f u %I p u [1 0 0 1 98 -42] concat %I t 1 0 0 1 98 -42 Begin %I Rect [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 [1 0 0 1 7 63] concat %I t 1 0 0 1 7 63 203 217 280 245 Rect %I 203 217 280 245 End Begin %I Text [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 221.5 300.5] concat %I t 1 0 0 1 221.5 300.5 %I Hit rexec [ (Hit rexec) ] Text End End %I eop Begin %I Line [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u 469 581 469 427 Line %I 469 581 469 427 End Begin %I Line [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u 476 581 476 385 Line %I 476 581 476 385 End Begin %I Line [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u 434 581 434 385 Line %I 434 581 434 385 End Begin %I Line [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u 441 581 441 427 Line %I 441 581 441 427 End Begin %I Text [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 178 535] concat %I t 1 0 0 1 178 535 %I [ () ] Text End Begin %I Rect [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 %I t u 203 560 203 560 Rect %I 203 560 203 560 End Begin %I Pict %I b u %I f u %I p u [1 0 0 1 -28 -161] concat %I t 1 0 0 1 -28 -161 Begin %I Rect [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 [1 0 0 1 0 0] concat %I t 1 0 0 1 0 0 77 560 203 651 Rect %I 77 560 203 651 End Begin %I Text [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 113 612] concat %I t 1 0 0 1 113 612 %I Host List [ (Host List) ] Text End Begin %I Poly [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 [1 0 0 1 0 0] concat %I t 1 0 0 1 0 0 %I 4 77 700 %I 77 700 105 651 %I 105 651 175 651 %I 175 651 203 700 %I 203 700 4 Poly End End %I eop Begin %I Pict %I b u %I f u %I p u [1 0 0 1 -140 -168] concat %I t 1 0 0 1 -140 -168 Begin %I Poly [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 [1 0 0 1 294 7] concat %I t 1 0 0 1 294 7 %I 4 77 700 %I 77 700 105 651 %I 105 651 175 651 %I 175 651 203 700 %I 203 700 4 Poly End Begin %I Rect [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 [1 0 0 1 294 7] concat %I t 1 0 0 1 294 7 77 560 203 651 Rect %I 77 560 203 651 End Begin %I Text [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 392 619] concat %I t 1 0 0 1 392 619 %I User Name List [ (User Name List) ] Text End End %I eop Begin %I Text [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 427 637] concat %I t 1 0 0 1 427 637 %I [ () ] Text End Begin %I Pict %I b u %I f u %I p u [1 0 0 1 280 35] concat %I t 1 0 0 1 280 35 Begin %I Rect [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 [1 0 0 1 0 0] concat %I t 1 0 0 1 0 0 63 623 119 651 Rect %I 63 623 119 651 End Begin %I Text [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 70 643.5] concat %I t 1 0 0 1 70 643.5 %I Phase 0 [ (Phase 0) ] Text End End %I eop Begin %I Pict %I b u %I f u %I p u [1 0 0 1 336 42] concat %I t 1 0 0 1 336 42 Begin %I Rect [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 %I t u 56 679 168 707 Rect %I 56 679 168 707 End Begin %I Text [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 64 699.5] concat %I t 1 0 0 1 64 699.5 %I /etc/hosts.equiv [ (/etc/hosts.equiv) ] Text End End %I eop Begin %I Pict %I b u %I f u %I p u [1 0 0 1 238 0] concat %I t 1 0 0 1 238 0 Begin %I Rect [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 %I t u 63 721 126 749 Rect %I 63 721 126 749 End Begin %I Text [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 70.5 741.5] concat %I t 1 0 0 1 70.5 741.5 %I /.rhosts [ (/.rhosts) ] Text End End %I eop Begin %I Pict %I b u %I f u %I p u [1 0 0 1 28 -224] concat %I t 1 0 0 1 28 -224 Begin %I Rect [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 %I t u 343 805 420 833 Rect %I 343 805 420 833 End Begin %I Text [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 351.5 825.5] concat %I t 1 0 0 1 351.5 825.5 %I ~/.forward [ (~/.forward) ] Text End End %I eop Begin %I Pict %I b u %I f u %I p u [1 0 0 1 112 -175] concat %I t 1 0 0 1 112 -175 Begin %I Rect [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 %I t u 350 756 420 784 Rect %I 350 756 420 784 End Begin %I Text [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 358 776.5] concat %I t 1 0 0 1 358 776.5 %I ~/.rhosts [ (~/.rhosts) ] Text End End %I eop Begin %I Rect [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 %I t u 63 742 63 742 Rect %I 63 742 63 742 End Begin %I Pict %I b u %I f u %I p u [1 0 0 1 252 -175] concat %I t 1 0 0 1 252 -175 Begin %I Rect [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 %I t u 175 616 231 644 Rect %I 175 616 231 644 End Begin %I Text [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 182 636.5] concat %I t 1 0 0 1 182 636.5 %I Phase 1 [ (Phase 1) ] Text End End %I eop Begin %I Pict %I b u %I f u %I p u [1 0 0 1 259 -176] concat %I t 1 0 0 1 259 -176 Begin %I Rect [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 [1 0 0 1 0 0.5] concat %I t 1 0 0 1 0 0.5 168 574 224 602 Rect %I 168 574 224 602 End Begin %I Text [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 175 595] concat %I t 1 0 0 1 175 595 %I Phase 2 [ (Phase 2) ] Text End End %I eop Begin %I Pict %I b u %I f u %I p u [1 0 0 1 378 -42] concat %I t 1 0 0 1 378 -42 Begin %I Rect [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 %I t u 105 700 189 728 Rect %I 105 700 189 728 End Begin %I Text [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 114 720.5] concat %I t 1 0 0 1 114 720.5 %I /etc/passwd [ (/etc/passwd) ] Text End End %I eop Begin %I Pict %I b u %I f u %I p u [1 0 0 1 -2 -4] concat %I t 1 0 0 1 -2 -4 Begin %I Rect [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 [1 0 0 1 2 4] concat %I t 1 0 0 1 2 4 231 350 357 399 Rect %I 231 350 357 399 End Begin %I Text [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 245 385] concat %I t 1 0 0 1 245 385 %I Guessed Passwords [ (Guessed Passwords) ] Text End End %I eop Begin %I Pict %I b u %I f u %I p u [1 0 0 1 252 -175] concat %I t 1 0 0 1 252 -175 Begin %I Rect [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 %I t u 175 532 231 560 Rect %I 175 532 231 560 End Begin %I Text [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 182 552.5] concat %I t 1 0 0 1 182 552.5 %I Phase 3 [ (Phase 3) ] Text End End %I eop Begin %I Pict %I b u %I f u %I p u [1 0 0 1 -35 -301] concat %I t 1 0 0 1 -35 -301 Begin %I Rect [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 %I t u 546 658 651 686 Rect %I 546 658 651 686 End Begin %I Text [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 553.5 678.5] concat %I t 1 0 0 1 553.5 678.5 %I /usr/dict/words [ (/usr/dict/words) ] Text End End %I eop Begin %I Pict %I b u %I f u %I p u [1 0 0 1 0 -1] concat %I t 1 0 0 1 0 -1 Begin %I Rect [] 0 1 1 1 SetB %I b 65535 1 1 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 [1.16667 0 0 1 4.66669 -90.5] concat %I t 1.16667 0 0 1 4.66669 -90.5 434 490 518 518 Rect %I 434 490 518 518 End Begin %I Text [] 0 1 1 1 SetB %I b 65535 1 1 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 518 420] concat %I t 1 0 0 1 518 420 %I Internal Words [ (Internal Words) ] Text End End %I eop Begin %I Pict %I b u %I f u %I p u %I t u Begin %I Rect [] 0 1 1 1 SetB %I b 65535 1 1 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 %I t u 511 441 616 469 Rect %I 511 441 616 469 End Begin %I Text [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 518.5 461.5] concat %I t 1 0 0 1 518.5 461.5 %I Obvious Guesses [ (Obvious Guesses) ] Text End End %I eop Begin %I Pict %I b u %I f u %I p u [1 0 0 1 14 -14] concat %I t 1 0 0 1 14 -14 Begin %I Rect [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 [1 0 0 1 7 35] concat %I t 1 0 0 1 7 35 203 217 280 245 Rect %I 203 217 280 245 End Begin %I Text [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 227.5 272.5] concat %I t 1 0 0 1 227.5 272.5 %I Hit rsh [ (Hit rsh) ] Text End End %I eop Begin %I Pict %I b u %I f u %I p u [1 0 0 1 -153 20] concat %I t 1 0 0 1 -153 20 Begin %I Rect [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 [1 0 0 1 -1.5 0.5] concat %I t 1 0 0 1 -1.5 0.5 203 217 280 245 Rect %I 203 217 280 245 End Begin %I Text [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 210 238] concat %I t 1 0 0 1 210 238 %I Hit finger [ (Hit finger) ] Text End End %I eop Begin %I Pict %I b u %I f u %I p u [1 0 0 1 -70 49] concat %I t 1 0 0 1 -70 49 Begin %I Rect [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 [1 0 0 1 7 -28] concat %I t 1 0 0 1 7 -28 203 217 280 245 Rect %I 203 217 280 245 End Begin %I Text [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 224.5 209.5] concat %I t 1 0 0 1 224.5 209.5 %I Hit SMTP [ (Hit SMTP) ] Text End End %I eop Begin %I Pict %I b u %I f u %I p u [1 0 0 1 -161 469] concat %I t 1 0 0 1 -161 469 Begin %I Rect [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 [1 0 0 1 0 -56] concat %I t 1 0 0 1 0 -56 203 217 280 245 Rect %I 203 217 280 245 End Begin %I Text [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 220.5 181.5] concat %I t 1 0 0 1 220.5 181.5 %I if_init [ (if_init) ] Text End End %I eop Begin %I Pict %I b u %I f u %I p u [1 0 0 1 -168 608] concat %I t 1 0 0 1 -168 608 Begin %I Rect [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 [1 0 0 1 -0.5 0.5] concat %I t 1 0 0 1 -0.5 0.5 196 112 301 140 Rect %I 196 112 301 140 End Begin %I Text [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 203 133] concat %I t 1 0 0 1 203 133 %I Interface Table [ (Interface Table) ] Text End End %I eop Begin %I Pict %I b u %I f u %I p u [1 0 0 1 -161 469] concat %I t 1 0 0 1 -161 469 Begin %I Rect [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 [1 0 0 1 126 -56] concat %I t 1 0 0 1 126 -56 203 217 280 245 Rect %I 203 217 280 245 End Begin %I Text [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 346.5 181.5] concat %I t 1 0 0 1 346.5 181.5 %I rt_init [ (rt_init) ] Text End End %I eop Begin %I Pict %I b u %I f u %I p u [1 0 0 1 -161 602] concat %I t 1 0 0 1 -161 602 Begin %I Rect [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 %I t u 322 119 413 147 Rect %I 322 119 413 147 End Begin %I Text [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 0 SetP %I p 65535 [1 0 0 1 328.5 139.5] concat %I t 1 0 0 1 328.5 139.5 %I Routing Table [ (Routing Table) ] Text End End %I eop Begin %I Text [] 0 1 0 1 SetB %I b 65535 1 0 1 /Courier 10 SetF %I f 6x13 Courier 10 1 SetP %I p 0 [1 0 0 1 336 112] concat %I t 1 0 0 1 336 112 %I (netstat) [ (\(netstat\)) ] Text End End %I eop %%Trailer showpage @endspecial t-rom.300 @sf 582 2571 p (Figure) s 10 r (1:) s 13 r (The) s 11 r (structure) s 10 r (of) s 10 r (the) s 10 r (attacking) s 9 r (engine.) s 954 2842 p (10) s @eop 11 @bop0 cmr7.300 @sf [<0C001E001E001E001E000E000E000E00070007000300018000C0C0C0C060E0307FF87FFC7FFC6000> 14 20 -2 0 17] 55 @dc [<0FC03FF07838E018E01CE01CE03C70FC3BF81FF01FC03FE07E7078387038703838701FE00FC0> 14 19 -1 0 17] 56 @dc [<1F003FC070E0787078783038003C1FBC3FFC707CF03CF03CF03CF03CF038703838701FE00FC0> 14 19 -1 0 17] 57 @dc cmr6.300 @sf [<08001C001C001C001C001C000C000C000E0006000300C180C1807FC07FE07FE06000> 11 17 -2 0 15] 55 @dc [<1F003F8071C0E0E0E0E0E0E073E03FC01F803F8079C071C071C071C03F801F00> 11 16 -1 0 15] 56 @dc [<3E007F00738071C000C008E03FE07FE0E1E0E0E0E0E0E0E0E0C071C03F801F00> 11 16 -1 0 15] 57 @dc 11 @bop1 t-rom.300 @sf -36 96 p (stream) s 8 r (connection,) s 8 r (instead) s 9 r (of) s 8 r 97 c 9 r (UDP) s 9 r (datagram) s 9 r (socket.) s cmr7.300 @sf 851 82 p 55 c t-rom.300 @sf 883 96 p 87 c -2 r 101 c -36 146 p (have) s 8 r (no) s 8 r (explanation) s 7 r (for) s 8 r (this;) s 8 r (it) s 8 r (only) s 7 r (tries) s 9 r (to) s 8 r (send) s 8 r (this) s 8 r (packet) s -36 196 p (with) s 8 r 97 c 10 r (one) s 11 r (in) s 9 r 174 c (fteen) s 11 r (random) s 10 r (chance.) s t-bol.300 @sf -36 310 p (A.3.2) s 40 r (Main) s 16 r (loop) s t-rom.300 @sf -36 390 p (An) s 12 r (in) s 174 c (nite) s 13 r (loop) s 13 r (comprises) s 14 r (the) s 14 r (main) s 14 r (active) s 14 r (component) s 14 r (of) s -36 439 p (the) s 7 r (virus.) s 13 r (It) s 9 r (calls) s 9 r (the) s t-ita.300 @sf 9 r (cracksome) s t-rom.300 @sf 10 r (routine) s cmr7.300 @sf 614 425 p 56 c t-rom.300 @sf 640 439 p (which) s 9 r (tries) s 9 r (to) s 8 r 174 c (nd) s -36 489 p (some) s 8 r (hosts) s 9 r (that) s 8 r (it) s 8 r (can) s 10 r (break) s 9 r (in) s 8 r (to.) s 13 r (Then) s 9 r (it) s 9 r (waits) s 8 r (30) s 9 r (seconds,) s -36 539 p (list) s -1 r (ening) s 12 r (for) s 13 r (other) s 14 r (virus) s 13 r (programs) s 14 r (attempting) s 13 r (to) s 13 r (break) s 15 r (in,) s -36 589 p (and) s 9 r (tries) s 10 r (to) s 9 r (break) s 11 r (into) s 9 r (another) s 10 r (batch) s 10 r (of) s 10 r (machines.) s 4 639 p (After) s 7 r (this) s 6 r (round) s 6 r (of) s 7 r (attacks,) s 8 r (it) s 7 r (forks,) s 7 r (creating) s 7 r (two) s 7 r (copies) s 7 r (of) s -36 689 p (the) s 9 r (virus;) s 9 r (the) s 11 r (original) s 9 r (\(parent\)) s 10 r (dies,) s 11 r (leaving) s 10 r (the) s 10 r (fresh) s 11 r (copy) s -2 r 46 c -36 739 p (The) s 13 r (child) s 14 r (copy) s 14 r (has) s 15 r (all) s 13 r (of) s 14 r (the) s 15 r (information) s 12 r (the) s 14 r (parent) s 14 r (had,) s -36 789 p (whil) s -1 r 101 c 8 r (not) s 8 r (having) s 8 r (the) s 9 r (accumulated) s 10 r (CPU) s 8 r (usage) s 10 r (of) s 9 r (the) s 8 r (parent.) s -36 839 p (It) s 9 r (also) s 9 r (has) s 11 r 97 c 11 r (new) s 11 r (process) s 10 r (id,) s 10 r (making) s 10 r (it) s 10 r (hard) s 10 r (to) s 10 r 174 c (nd.) s 4 889 p (Next,) s 12 r (the) s t-ita.300 @sf 12 r (hg) s t-rom.300 @sf 44 c t-ita.300 @sf 12 r (hl) s t-rom.300 @sf 44 c 11 r (and) s t-ita.300 @sf 12 r (ha) s t-rom.300 @sf 11 r (routines) s 11 r (search) s 13 r (for) s 11 r (machines) s 12 r (to) s -36 939 p (infect) s 10 r (\(see) s 12 r (Appendix) s 10 r (A.5\).) s 18 r (The) s 12 r (program) s 12 r (sleeps) s 12 r (for) s 11 r 50 c 11 r (min-) s -36 989 p (utes,) s 9 r (and) s 10 r (then) s 10 r (checks) s 11 r (to) s 10 r (see) s 11 r (if) s 10 r (it) s 9 r (has) s 11 r (been) s 10 r (running) s 9 r (for) s 9 r (more) s -36 1039 p (than) s 11 r (12) s 12 r (hours,) s 13 r (cleaning) s 13 r (up) s 12 r (some) s 13 r (of) s 13 r (the) s 12 r (entries) s 13 r (in) s 12 r (the) s 12 r (host) s -36 1089 p (list) s 8 r (if) s 9 r (it) s 10 r (has.) s 4 1139 p (Finally) s -2 r 44 c 15 r (before) s 16 r (repeating,) s 17 r (it) s 15 r (checks) s 17 r (the) s 15 r (global) s 15 r (variable) s c-med.300 @sf -36 1189 p (pleasequit) s t-rom.300 @sf 46 c 14 r (If) s 11 r (it) s 11 r (is) s 10 r (set,) s t-ita.300 @sf 12 r (and) s t-rom.300 @sf 11 r (if) s 11 r (it) s 10 r (has) s 11 r (tried) s 11 r (more) s 11 r (than) s 11 r (10) s -36 1239 p (words) s 10 r (from) s 11 r (its) s 11 r (own) s 11 r (dictionary) s 10 r (against) s 11 r (existing) s 10 r (passwords,) s -36 1289 p (it) s 12 r (quit) s -1 r (s.) s 21 r (Thus) s 14 r (forcing) s c-med.300 @sf 12 r (pleasequit) s t-rom.300 @sf 12 r (to) s 12 r (be) s 14 r (set) s 13 r (in) s 13 r (the) s 13 r (sys-) s -36 1338 p (tem) s 10 r (libraries) s 10 r (will) s 10 r (do) s 11 r (very) s 11 r (little) s 9 r (to) s 11 r (stem) s 12 r (the) s 11 r (progress) s 11 r (of) s 10 r (this) s -36 1388 p (viru) s -1 r 115 c cmr7.300 @sf 47 1374 p 57 c t-rom.300 @sf 64 1388 p 46 c t-bol.360 @sf -36 1511 p (A.4) s 49 r (Cracking) s 18 r 114 c (outines) s t-rom.300 @sf -36 1590 p (This) s 18 r (collection) s 18 r (of) s 20 r (routines) s 18 r (is) s 20 r (the) s 19 r 96 c -2 r (`brain') s -3 r 39 c 17 r (of) s 20 r (the) s 19 r (virus.) s t-ita.300 @sf -36 1640 p (cracksome) s t-rom.300 @sf 44 c 12 r (the) s 12 r (main) s 12 r (switch,) s 11 r (chooses) s 12 r (which) s 12 r (of) s 11 r (four) s 11 r (strate-) s -36 1690 p (gies) s 10 r (to) s 11 r (execute.) s 18 r (It) s 11 r (is) s 11 r (would) s 10 r (be) s 12 r (the) s 11 r (central) s 12 r (point) s 10 r (for) s 10 r (adding) s -36 1740 p (new) s 17 r (strategies) s 18 r (if) s 18 r (the) s 18 r (virus) s 17 r (were) s 19 r (to) s 18 r (be) s 18 r (further) s 17 r (extended.) s -36 1790 p (The) s 17 r (virus) s 16 r (works) s 18 r (each) s 18 r (strategy) s 17 r (through) s 16 r (completely) s -2 r 44 c 19 r (then) s -36 1839 p (switches) s 12 r (to) s 13 r (the) s 13 r (next) s 13 r (one.) s 23 r (Each) s 14 r (pass) s 14 r (through) s 11 r (the) s 14 r (cracking) s -36 1889 p (rout) s -1 r (ines) s 7 r (only) s 8 r (performs) s 8 r 97 c 9 r (small) s 9 r (amount) s 8 r (of) s 9 r (work,) s 8 r (but) s 8 r (enough) s -36 1939 p (state) s 10 r (is) s 11 r (remembered) s 13 r (in) s 10 r (each) s 12 r (pass) s 12 r (to) s 11 r (continue) s 10 r (the) s 11 r (next) s 11 r (time) s -36 1989 p (around.) s t-bol.300 @sf -36 2103 p (A.4.1) s 40 r (cracksome) s t-rom.300 @sf -36 2183 p (The) s t-ita.300 @sf 13 r (cracksome) s t-rom.300 @sf 15 r (routine) s 13 r (is) s 13 r (the) s 14 r (central) s 13 r (switching) s 13 r (routine) s 12 r (of) s -36 2232 p (the) s 10 r (cracking) s 11 r (code.) s 18 r (It) s 11 r (decides) s 12 r (which) s 11 r (of) s 11 r (the) s 11 r (cracking) s 12 r (strate-) s -36 2282 p (gies) s 12 r (is) s 14 r (actually) s 13 r (exercised) s 15 r (next.) s 24 r (Again,) s 14 r (note) s 13 r (that) s 14 r (this) s 12 r (rou-) s -36 2332 p (tin) s -1 r 101 c 12 r (was) s 14 r (named) s 14 r (in) s 12 r (the) s 13 r (global) s 12 r (symbol) s 13 r (table.) s 22 r (It) s 13 r (could) s 12 r (have) s -36 2382 p (been) s 8 r (given) s 8 r 97 c 9 r (confusing) s 8 r (or) s 8 r (random) s 9 r (name,) s 10 r (but) s 8 r (it) s 8 r (was) s 9 r (actually) s -36 2432 p (clearly) s 7 r (labelled,) s 10 r (which) s 8 r (lends) s 9 r (some) s 9 r (credence) s 11 r (to) s 8 r (the) s 9 r (idea) s 9 r (that) s -36 2482 p (the) s 9 r (virus) s 9 r (was) s 11 r (released) s 11 r (prematurely) s -2 r 46 c -36 2520 p 390 2 ru cmr6.300 @sf 5 2548 p 55 c t-rom.240 @sf 22 2559 p (If) s 9 r (the) s 9 r (author) s 8 r (had) s 8 r (been) s 7 r (as) s 9 r (careful) s 8 r (with) s 9 r (error) s 9 r (checking) s 7 r (here) s 8 r (as) s 8 r (he) s 9 r (tried) s -36 2598 p (to) s 10 r (be) s 9 r (elsewhere,) s 11 r (he) s 10 r (would) s 10 r (have) s 9 r (noted) s 10 r (the) s 10 r (error) s 11 r 96 c -1 r (`sock) s -1 r (et) s 9 r (not) s 10 r (connected') s -3 r 39 c -36 2638 p (every) s 6 r (time) s 8 r (this) s 8 r (routine) s 8 r (is) s 8 r (invoked.) s cmr6.300 @sf 5 2666 p 56 c t-rom.240 @sf 22 2677 p (This) s 9 r (name) s 7 r (was) s 8 r (actually) s 7 r (in) s 8 r (the) s 8 r (symbol) s 7 r (table) s 8 r (of) s 8 r (the) s 8 r (distributed) s 7 r (binary!) s cmr6.300 @sf 5 2706 p 57 c t-rom.240 @sf 22 2717 p (Although) s 7 r (it) s 9 r (was) s 8 r (suggested) s 6 r (very) s 7 r (early) s 8 r 91 c (20) s -1 r (].) s t-bol.300 @sf 1012 96 p (A.4.2) s 42 r (Phase) s 17 r 48 c t-rom.300 @sf 1012 176 p (The) s 18 r 174 c (rst) s 17 r (phase) s 18 r (of) s 17 r (the) s t-ita.300 @sf 17 r (cracksome) s t-rom.300 @sf 18 r (routines) s 16 r (reads) s 18 r (through) s 1012 226 p (the) s c-med.300 @sf 10 r (/etc/hosts.equiv) s 8 r t-rom.300 @sf 174 c (le) s 9 r (to) s 9 r 174 c (nd) s 9 r (machine) s 11 r (names) s 10 r (that) s 1012 276 p (would) s 9 r (be) s 9 r (likely) s 8 r (tar) s (gets.) s 13 r (While) s 9 r (this) s 8 r 174 c (le) s 10 r (indicates) s 9 r (what) s 9 r (hosts) s 1012 326 p (the) s 12 r (current) s 11 r (machine) s 12 r (trusts,) s 11 r (it) s 11 r (is) s 11 r (fairly) s 11 r (common) s 12 r (to) s 10 r 174 c (nd) s 12 r (sys-) s 1012 375 p (tems) s 14 r (where) s 13 r (all) s 13 r (machines) s 14 r (in) s 12 r 97 c 14 r (cluster) s 13 r (trust) s 12 r (each) s 14 r (other) s -1 r 44 c 13 r (and) s 1012 425 p (at) s 16 r (the) s 14 r (very) s 15 r (least) s 15 r (it) s 14 r (is) s 15 r (likely) s 14 r (that) s 14 r (people) s 15 r (with) s 14 r (accounts) s 15 r (on) s 1012 475 p (this) s 7 r (machine) s 8 r (will) s 6 r (have) s 8 r (accounts) s 7 r (on) s 7 r (the) s 7 r (other) s 7 r (machines) s 8 r (men-) s 1012 525 p (tioned) s 10 r (in) s c-med.300 @sf 9 r (/etc/hosts.equiv) s t-rom.300 @sf 46 c 1054 576 p (It) s 13 r (also) s 14 r (reads) s 15 r (the) s c-med.300 @sf 13 r (/.rhosts) s 14 r t-rom.300 @sf 174 c (le,) s 15 r (which) s 13 r (lists) s 13 r (the) s 14 r (set) s 14 r (of) s 1012 626 p (machines) s 15 r (that) s 13 r (this) s 13 r (machine) s 14 r (trusts) s 13 r (root) s 13 r (access) s 16 r (from.) s 24 r (Note) s 1012 675 p (that) s 14 r (it) s 14 r (does) s 14 r (not) s 14 r (take) s 14 r (advantage) s 15 r (of) s 14 r (the) s 14 r (trust) s 13 r (itself) s 14 r 91 c (21) s -1 r 93 c 14 r (but) s 1012 725 p (merely) s 15 r (uses) s 14 r (the) s 13 r (names) s 15 r (as) s 15 r 97 c 14 r (list) s 12 r (of) s 14 r (additional) s 12 r (machines) s 14 r (to) s 1012 775 p (attack.) s 14 r (Often,) s 7 r (system) s 8 r (managers) s 8 r (will) s 6 r (deny) s 7 r (read) s 8 r (access) s 9 r (to) s 6 r (this) s 1012 825 p 174 c (le) s 9 r (to) s 9 r (any) s 8 r (user) s 9 r (other) s 8 r (than) s 9 r (root) s 7 r (itself,) s 9 r (to) s 8 r (avoid) s 8 r (providing) s 7 r (any) s 1012 875 p (easy) s 13 r (list) s 10 r (of) s 11 r (secondary) s 11 r (tar) s (gets) s 10 r (that) s 11 r (could) s 11 r (be) s 11 r (used) s 12 r (to) s 10 r (subvert) s 1012 925 p (the) s 13 r (machine;) s 13 r (this) s 12 r (practice) s 13 r (would) s 11 r (have) s 13 r (prevented) s 12 r (the) s 12 r (virus) s 1012 974 p (from) s 7 r (discovering) s 6 r (those) s 7 r (names,) s 9 r (although) s c-med.300 @sf 5 r (/.rhosts) s t-rom.300 @sf 7 r (is) s 7 r (very) s 1012 1024 p (often) s 10 r 97 c 11 r (subset) s 10 r (of) s c-med.300 @sf 10 r (/etc/hosts.equiv) s t-rom.300 @sf 46 c 1054 1075 p (The) s 16 r (program) s 15 r (then) s 15 r (reads) s 16 r (the) s 15 r (entire) s 15 r (local) s 15 r (password) s 15 r 174 c (le,) s c-med.300 @sf 1012 1125 p (/etc/passwd) s t-rom.300 @sf 46 c 21 r (It) s 12 r (uses) s 13 r (this) s 12 r (to) s 12 r 174 c (nd) s 12 r (personal) s c-med.300 @sf 12 r (.forward) s 1012 1175 p t-rom.300 @sf 174 c (les,) s 12 r (and) s 11 r (reads) s 11 r (them) s 11 r (in) s 11 r (search) s 12 r (of) s 10 r (names) s 12 r (of) s 10 r (other) s 11 r (machines) s 1012 1225 p (it) s 18 r (can) s 19 r (attack.) s 38 r (It) s 18 r (also) s 18 r (records) s 19 r (the) s 18 r (user) s 18 r (name,) s 22 r (encrypted) s 1012 1274 p (password,) s 22 r (and) s t-ita.300 @sf 18 r (GECOS) s t-rom.300 @sf 19 r (information) s 17 r (string,) s 19 r (all) s 19 r (of) s 18 r (which) s 1012 1324 p (are) s 15 r (stored) s 14 r (in) s 13 r (the) s c-med.300 @sf 14 r (/etc/passwd) s 13 r t-rom.300 @sf 174 c (le.) s 25 r (Once) s 15 r (the) s 14 r (program) s 1012 1374 p (scanned) s 12 r (the) s 10 r (entire) s 10 r 174 c (le,) s 10 r (it) s 10 r (advanced) s 11 r (to) s 10 r (Phase) s 11 r (1.) s t-bol.300 @sf 1012 1491 p (A.4.3) s 42 r (Phase) s 17 r 49 c t-rom.300 @sf 1012 1571 p (This) s 11 r (phase) s 11 r (of) s 11 r (the) s 10 r (cracking) s 11 r (code) s 11 r (attacked) s 11 r (passwords) s 10 r (on) s 11 r (the) s 1012 1621 p (local) s 13 r (machine.) s 23 r (It) s 13 r (chose) s 13 r (several) s 14 r (likely) s 12 r (passwords) s 13 r (for) s 12 r (each) s 1012 1671 p (user) s -1 r 44 c 11 r (which) s 11 r (were) s 12 r (then) s 10 r (encrypted) s 11 r (and) s 11 r (compared) s 11 r (against) s 11 r (the) s 1012 1721 p (encryptions) s 10 r (obtained) s 9 r (in) s 10 r (Phase) s 11 r 48 c 10 r (from) s c-med.300 @sf 10 r (/etc/passwd) s t-rom.300 @sf 58 c cmsy10.300 @sf 1054 1772 p 15 c t-rom.300 @sf 20 r (No) s 11 r (password) s 10 r (at) s 10 r (all.) s cmsy10.300 @sf 1054 1821 p 15 c t-rom.300 @sf 20 r (The) s 11 r (user) s 11 r (name) s 11 r (itself.) s cmsy10.300 @sf 1054 1871 p 15 c t-rom.300 @sf 20 r (The) s 11 r (user) s 11 r (name) s 11 r (appended) s 11 r (to) s 9 r (itself.) s cmsy10.300 @sf 1054 1921 p 15 c t-rom.300 @sf 20 r (The) s 11 r (second) s 10 r (of) s 9 r (the) s 10 r (comma) s 11 r (separated) s t-ita.300 @sf 11 r (GECOS) s t-rom.300 @sf 9 r (informa-) s 1095 1971 p (tion) s 9 r 174 c (elds,) s 11 r (which) s 10 r (is) s 10 r (commonly) s 10 r 97 c 11 r (nickname.) s cmsy10.300 @sf 1054 2021 p 15 c t-rom.300 @sf 20 r (The) s 12 r (remainder) s 12 r (of) s 11 r (the) s 11 r (full) s 10 r (name) s 12 r (after) s 11 r (the) s 11 r 174 c (rst) s 11 r (name) s 12 r (in) s 1095 2070 p (the) s t-ita.300 @sf 14 r (GECOS) s 14 r t-rom.300 @sf 174 c (elds,) s 16 r (i.e.) s 26 r (probably) s 12 r (the) s 14 r (last) s 14 r (name,) s 17 r (with) s 1095 2120 p (the) s 11 r 174 c (rst) s 10 r (letter) s 9 r (converted) s 10 r (to) s 10 r (lower) s 10 r (case.) s cmsy10.300 @sf 1054 2170 p 15 c t-rom.300 @sf 20 r (This) s 11 r 96 c -2 r (`last) s 8 r (name') s -2 r 39 c 10 r (reversed.) s 1054 2221 p (All) s 14 r (of) s 15 r (these) s 15 r (attacks) s 15 r (are) s 16 r (applied) s 14 r (to) s 14 r 174 c (fty) s 14 r (passwords) s 15 r (at) s 15 r 97 c 1012 2271 p (time) s 13 r (from) s 12 r (those) s 12 r (collected) s 12 r (in) s 12 r (Phase) s 13 r (0.) s 20 r (Once) s 13 r (it) s 11 r (had) s 13 r (tried) s 11 r (to) s 1012 2321 p (guess) s 14 r (the) s 13 r (passwords) s 13 r (for) s 13 r (all) s 13 r (local) s 13 r (accounts,) s 15 r (it) s 12 r (advanced) s 14 r (to) s 1012 2371 p (Phase) s 12 r (2.) s t-bol.300 @sf 1012 2488 p (A.4.4) s 42 r (Phase) s 17 r 50 c t-rom.300 @sf 1012 2568 p (Phase) s 16 r 50 c 15 r (takes) s 15 r (the) s 14 r (internal) s 14 r (word) s 14 r (list) s 13 r (distribut) s -1 r (ed) s 13 r (as) s 16 r (part) s 14 r (of) s 1012 2617 p (the) s 14 r (virus) s 14 r (\(see) s 15 r (Appendix) s 13 r (B\)) s 14 r (and) s 14 r (shuf) s 175 c (es) s 13 r (it.) s 25 r (Then) s 15 r (it) s 13 r (takes) s 1012 2667 p (the) s 13 r (words) s 12 r (one) s 13 r (at) s 13 r 97 c 13 r (time) s 13 r (and) s 13 r (decodes) s 13 r (them) s 13 r (\(the) s 12 r (high) s 12 r (bit) s 12 r (is) s 1012 2717 p (set) s 11 r (on) s 11 r (all) s 10 r (of) s 11 r (the) s 10 r (characters) s 12 r (to) s 11 r (obscure) s 11 r (them\)) s 10 r (and) s 11 r (tries) s 10 r (them) s 955 2842 p 49 c -1 r 49 c @eop 12 @bop0 12 @bop1 t-rom.300 @sf -36 96 p (against) s 9 r (all) s 11 r (collected) s 11 r (passwords.) s 17 r (It) s 11 r (maintains) s 10 r 97 c 12 r (global) s 10 r (vari-) s -36 146 p (able) s c-med.300 @sf 8 r (nextw) s t-rom.300 @sf 9 r (as) s 10 r (an) s 9 r (index) s 9 r (into) s 8 r (this) s 8 r (table.) s 14 r (The) s 10 r (main) s 9 r (loop) s 8 r (uses) s -36 196 p (thi) s -1 r 115 c 7 r (to) s 7 r (prevent) s c-med.300 @sf 8 r (pleasequit) s t-rom.300 @sf 7 r (from) s 8 r (causing) s 8 r (the) s 8 r (virus) s 7 r (to) s 7 r (exit) s -36 246 p (unti) s -1 r 108 c 7 r (at) s 9 r (least) s 10 r (ten) s 9 r (of) s 9 r (the) s 9 r (words) s 9 r (have) s 10 r (been) s 10 r (checked) s 10 r (against) s 9 r (all) s -36 295 p (of) s 8 r (the) s 11 r (encryptions) s 9 r (in) s 9 r (the) s 10 r (collected) s 11 r (list.) s 4 345 p (Again,) s 8 r (when) s 7 r (the) s 7 r (word) s 6 r (list) s 6 r (is) s 7 r (exhausted) s 7 r (the) s 7 r (virus) s 6 r (advances) s -36 395 p (to) s 8 r (Phase) s 11 r (3.) s t-bol.300 @sf -36 504 p (A.4.5) s 40 r (Phase) s 17 r 51 c t-rom.300 @sf -36 581 p (Phase) s 18 r 51 c 18 r (looks) s 18 r (at) s 18 r (the) s 19 r (local) s c-med.300 @sf 18 r (/usr/dict/words) s 17 r t-rom.300 @sf 174 c (le,) s 21 r 97 c -36 631 p (24474) s 8 r (word) s 11 r (list) s 9 r (distributed) s 9 r (with) s 10 r (4.3BSD) s 11 r (\(and) s 10 r (other) s 11 r (UNIX) s -36 681 p (systems\)) s 11 r (as) s 13 r 97 c 13 r (spelling) s 11 r (dictionary) s -3 r 46 c 19 r (The) s 12 r (words) s 12 r (are) s 13 r (stored) s 12 r (in) s -36 731 p (thi) s -1 r 115 c 15 r 174 c (le) s 16 r (one) s 16 r (word) s 16 r (per) s 16 r (line.) s 31 r (One) s 17 r (word) s 15 r (at) s 17 r 97 c 16 r (time) s 16 r (is) s 16 r (tried) s -36 781 p (against) s 12 r (all) s 14 r (encrypted) s 13 r (passwords.) s 25 r (If) s 14 r (the) s 14 r (word) s 13 r (begins) s 14 r (with) s -36 830 p (an) s 14 r (upper) s 14 r (case) s 16 r (letter) s -1 r 44 c 15 r (the) s 15 r (letter) s 14 r (is) s 15 r (converted) s 14 r (to) s 15 r (lower) s 14 r (case) s -36 880 p (and) s 9 r (the) s 10 r (word) s 10 r (is) s 10 r (tried) s 9 r (again.) s 4 930 p (When) s 10 r (the) s 11 r (dictionary) s 8 r (runs) s 10 r (out,) s 10 r (the) s 10 r (phase) s 11 r (counter) s 10 r (is) s 10 r (again) s -36 980 p (advanced) s 20 r (to) s 19 r 52 c 21 r (\(thus) s 19 r (no) s 20 r (more) s 21 r (password) s 20 r (cracking) s 21 r (is) s 20 r (at-) s -36 1030 p (tempted\).) s t-bol.360 @sf -36 1147 p (A.5) s 49 r 72 c 18 r 114 c (outines) s t-rom.300 @sf -36 1224 p (The) s 16 r 96 c -2 r (`h) s 14 r (routines') s -2 r 39 c 14 r (are) s 18 r 97 c 16 r (collection) s 16 r (of) s 16 r (routines) s 15 r (with) s 15 r (short) s -36 1274 p (names,) s 15 r (such) s 14 r (as) s t-ita.300 @sf 14 r (hg) s t-rom.300 @sf 44 c t-ita.300 @sf 15 r (ha) s t-rom.300 @sf 44 c t-ita.300 @sf 15 r (hi) s t-rom.300 @sf 44 c 14 r (and) s t-ita.300 @sf 14 r (hl) s t-rom.300 @sf 44 c 15 r (which) s 13 r (search) s 15 r (for) s 13 r (other) s -36 1324 p (hosts) s 8 r (to) s 10 r (attack.) s t-bol.300 @sf -36 1433 p (A.5.1) s 40 r (hg) s t-rom.300 @sf -36 1510 p (The) s t-ita.300 @sf 8 r (hg) s t-rom.300 @sf 7 r (routine) s 8 r (calls) s t-ita.300 @sf 8 r (rt) s 2 r 13 2 ru 13 r (init) s t-rom.300 @sf 7 r (\(if) s 7 r (it) s 8 r (has) s 9 r (not) s 7 r (already) s 9 r (been) s 9 r (called\)) s -36 1560 p (to) s 11 r (scan) s 14 r (the) s 13 r (routing) s 12 r (table,) s 14 r (and) s 13 r (records) s 13 r (all) s 13 r (gateways) s 14 r (except) s -36 1610 p (the) s 8 r (loopback) s 9 r (address) s 10 r (in) s 9 r 97 c 11 r (special) s 10 r (list.) s 12 r (It) s 10 r (then) s 9 r (tries) s 9 r 97 c 10 r (generic) s -36 1660 p (attack) s 13 r (routine) s 13 r (to) s 14 r (attack) s 14 r (via) s c-med.300 @sf 14 r (rsh) s t-rom.300 @sf 44 c c-med.300 @sf 16 r (finger) s t-rom.300 @sf 44 c 15 r (and) s 15 r (SMTP) s -4 r 46 c 14 r (It) s -36 1710 p (returns) s 8 r (after) s 11 r (the) s 10 r 174 c (rst) s 10 r (successful) s 11 r (attack.) s t-bol.300 @sf -36 1818 p (A.5.2) s 40 r (ha) s t-rom.300 @sf -36 1896 p (The) s t-ita.300 @sf 10 r (ha) s t-rom.300 @sf 11 r (routine) s 10 r (goes) s 11 r (through) s 10 r (the) s 11 r (gateway) s 11 r (list) s 10 r (and) s 11 r (connects) s -36 1946 p (to) s 7 r (TCP) s 10 r (port) s 9 r (23,) s 9 r (the) s 10 r (telnet) s 8 r (port,) s 9 r (looking) s 8 r (for) s 9 r (gateways) s 10 r (which) s -36 1996 p (are) s 9 r (running) s 7 r (telnet) s 9 r (listeners.) s 13 r (It) s 9 r (randomizes) s 9 r (the) s 9 r (order) s 9 r (of) s 9 r (such) s -36 2045 p (gateways) s 8 r (and) s 9 r (calls) s t-ita.300 @sf 10 r (hn) s t-rom.300 @sf 8 r (\(our) s 9 r (name\)) s 10 r (with) s 8 r (the) s 8 r (network) s 9 r (number) s -36 2095 p (of) s 9 r (each) s 12 r (gateway) s -2 r 46 c 15 r (The) s t-ita.300 @sf 11 r (ha) s t-rom.300 @sf 11 r (returns) s 10 r (after) s t-ita.300 @sf 11 r (hn) s t-rom.300 @sf 10 r (reports) s 10 r (that) s 10 r (it) s 10 r (has) s -36 2145 p (succeeded) s 10 r (broken) s 10 r (into) s 9 r 97 c 11 r (host.) s t-bol.300 @sf -36 2254 p (A.5.3) s 40 r (hl) s t-rom.300 @sf -36 2331 p (The) s t-ita.300 @sf 7 r (hl) s t-rom.300 @sf 7 r (routine) s 7 r (iterates) s 8 r (through) s 6 r (all) s 8 r (the) s 7 r (addresses) s 10 r (for) s 7 r (the) s 8 r (local) s -36 2381 p (machine) s 10 r (calling) s t-ita.300 @sf 10 r (hn) s t-rom.300 @sf 10 r (with) s 10 r (the) s 10 r (network) s 10 r (number) s 11 r (for) s 10 r (each) s 12 r (one.) s -36 2431 p (It) s 9 r (returns) s 9 r (if) s t-ita.300 @sf 10 r (hn) s t-rom.300 @sf 10 r (indicates) s 9 r (success) s 12 r (in) s 10 r (breaking) s 10 r (into) s 9 r 97 c 10 r (host.) s t-bol.300 @sf -36 2540 p (A.5.4) s 40 r (hi) s t-rom.300 @sf -36 2617 p (The) s t-ita.300 @sf 11 r (hi) s t-rom.300 @sf 12 r (routine) s 11 r (goes) s 13 r (through) s 10 r (the) s 12 r (internal) s 12 r (host) s 11 r (list) s 11 r (\(see) s 14 r (sec-) s -36 2667 p (tio) s -1 r 110 c 8 r (A.4.2\)) s 10 r (and) s 10 r (tries) s 10 r (to) s 9 r (attack) s 10 r (each) s 11 r (host) s 10 r (via) s c-med.300 @sf 9 r (rsh) s t-rom.300 @sf 44 c c-med.300 @sf 11 r (finger) s t-rom.300 @sf 44 c -36 2717 p (and) s 9 r (SMTP) s -4 r 46 c 10 r (It) s 10 r (returns) s 10 r (if) s 10 r (when) s 10 r (one) s 10 r (host) s 10 r (is) s 10 r (infected.) s t-bol.300 @sf 1012 96 p (A.5.5) s 42 r (hn) s t-rom.300 @sf 1012 197 p (The) s t-ita.300 @sf 8 r (hn) s t-rom.300 @sf 7 r (routine) s 5 r (\(our) s 7 r (name\)) s 8 r (followed) s t-ita.300 @sf 5 r (hi) s t-rom.300 @sf 7 r (takes) s 7 r 97 c 8 r (network) s 6 r (num-) s 1012 247 p (ber) s 14 r (as) s 13 r (an) s 13 r (ar) s (gument.) s 22 r (Surprisingl) s -1 r 121 c 11 r (it) s 12 r (returns) s 12 r (if) s 13 r (the) s 12 r (network) s 1012 297 p (number) s 10 r (supplied) s 9 r (is) s 10 r (the) s 10 r (same) s 11 r (as) s 11 r (the) s 10 r (network) s 9 r (number) s 10 r (of) s 10 r (any) s 1012 346 p (of) s 16 r (the) s 16 r (interfaces) s 16 r (on) s 15 r (the) s 16 r (local) s 16 r (machine.) s 31 r (For) s 16 r (Class) s 16 r 65 c 15 r (ad-) s 1012 396 p (dresses) s 14 r (it) s 12 r (uses) s 13 r (the) s 13 r (Arpanet) s 12 r (IMP) s 13 r (convention) s 11 r (to) s 12 r (create) s 14 r (pos-) s 1012 446 p (sible) s 10 r (addresses) s 11 r (to) s 9 r (attack) s 10 r (\(net.[1-8].0.[1-255]\).) s 12 r (For) s 10 r (all) s 9 r (other) s 1012 496 p (networks) s 11 r (it) s 11 r (guesses) s 13 r (hosts) s 11 r (number) s 11 r (one) s 12 r (through) s 10 r (255) s 11 r (on) s 11 r (that) s 1012 546 p (network.) s 30 r (It) s 16 r (randomizes) s 16 r (the) s 15 r (order) s 16 r (of) s 15 r (this) s 15 r (list) s 15 r (of) s 15 r (possible) s 1012 596 p (hosts) s 13 r (and) s 14 r (tries) s 12 r (to) s 13 r (attack) s 14 r (up) s 13 r (to) s 12 r (twenty) s 13 r (of) s 13 r (them) s 13 r (using) s c-med.300 @sf 12 r (rsh) s t-rom.300 @sf 44 c c-med.300 @sf 1012 645 p (finger) s t-rom.300 @sf 44 c 11 r (and) s 10 r (SMTP) s -4 r 46 c 10 r (If) s 10 r 97 c 11 r (host) s 9 r (does) s 11 r (not) s 9 r (accept) s 11 r (connections) s 1012 695 p (on) s 11 r (TCP) s 11 r (port) s 10 r (514,) s 11 r (the) s c-med.300 @sf 11 r (rsh) s t-rom.300 @sf 11 r (port,) s t-ita.300 @sf 11 r (hn) s t-rom.300 @sf 10 r (will) s 10 r (not) s 10 r (try) s 10 r (to) s 11 r (attack) s 11 r (it.) s 1012 745 p (If) s 10 r 97 c 11 r (host) s 10 r (is) s 10 r (successfully) s 10 r (attacked) s t-ita.300 @sf 11 r (hn) s t-rom.300 @sf 10 r (returns.) s t-bol.300 @sf 1012 922 p (A.5.6) s 42 r (Usage) s t-rom.300 @sf 1012 1023 p (The) s 13 r 96 c -2 r (`h) s 11 r (routines') s -3 r 39 c 10 r (are) s 13 r (called) s 12 r (in) s 12 r (groups) s 11 r (in) s 12 r (the) s 11 r (main) s 13 r (loop;) s 11 r (if) s 1012 1073 p (the) s 13 r 174 c (rst) s 12 r (routine) s 11 r (succeedes) s 14 r (in) s 12 r 174 c (nding) s 11 r 97 c 13 r (vulnerable) s 12 r (host) s 12 r (the) s 1012 1123 p (remaining) s 11 r (routines) s 10 r (are) s 11 r (not) s 11 r (called) s 11 r (in) s 10 r (the) s 11 r (current) s 11 r (pass.) s 16 r (Each) s 1012 1173 p (routine) s 14 r (returns) s 13 r (after) s 15 r (it) s 13 r 174 c (nds) s 14 r (one) s 15 r (vulnerable) s 13 r (host.) s 26 r (The) s t-ita.300 @sf 15 r (hg) s t-rom.300 @sf 1012 1223 p (routine) s 11 r (is) s 12 r (always) s 13 r (called) s 12 r 174 c (rst,) s 13 r (which) s 12 r (indicates) s 12 r (the) s 12 r (virus) s 11 r (re-) s 1012 1272 p (ally) s 16 r (wanted) s 15 r (to) s 16 r (infect) s 15 r (gateway) s 16 r (machines.) s 32 r (Next) s 15 r (comes) s t-ita.300 @sf 17 r (hi) s t-rom.300 @sf 1012 1322 p (which) s 11 r (tried) s 10 r (to) s 11 r (infect) s 10 r (normal) s 11 r (hosts) s 10 r (found) s 10 r (via) s t-ita.300 @sf 11 r (cracksome) s t-rom.300 @sf 46 c 18 r (If) s t-ita.300 @sf 1012 1372 p (hi) s t-rom.300 @sf 7 r (fails,) s t-ita.300 @sf 8 r (ha) s t-rom.300 @sf 7 r (is) s 7 r (called,) s 9 r (which) s 6 r (seemed) s 9 r (to) s 7 r (try) s 6 r (breaking) s 7 r (into) s 6 r (hosts) s 1012 1422 p (with) s 14 r (randomly) s 13 r (guessed) s 15 r (addresses) s 15 r (on) s 14 r (the) s 14 r (far) s 14 r (side) s 15 r (of) s 13 r (gate-) s 1012 1472 p (ways.) s 15 r (This) s 9 r (assumes) s 11 r (that) s 9 r (all) s 9 r (the) s 10 r (addresses) s 10 r (for) s 9 r (gateways) s 11 r (had) s 1012 1521 p (been) s 13 r (obtained) s 11 r (\(which) s 12 r (is) s 12 r (not) s 11 r (trivial) s 10 r (to) s 12 r (verify) s 11 r (from) s 12 r (the) s 12 r (con-) s 1012 1571 p (voluted) s 14 r (code) s 15 r (in) s t-ita.300 @sf 14 r (rt) s 15 r (init) s t-rom.300 @sf (\),) s 15 r (and) s 15 r (implies) s 14 r (that) s 14 r (the) s 15 r (virus) s 14 r (would) s 1012 1621 p (prefer) s 14 r (to) s 12 r (infect) s 12 r 97 c 14 r (gateway) s 13 r (and) s 13 r (from) s 13 r (there) s 13 r (reach) s 13 r (out) s 12 r (to) s 13 r (the) s 1012 1671 p (gateway') s -1 r 115 c 8 r (connected) s 8 r (networks,) s 8 r (rather) s 8 r (than) s 8 r (trying) s 6 r (to) s 7 r (hop) s 8 r (the) s 1012 1721 p (gateway) s 10 r (directly) s -2 r 46 c 12 r (If) s t-ita.300 @sf 9 r (hg) s t-rom.300 @sf 44 c t-ita.300 @sf 10 r (hi) s t-rom.300 @sf 44 c 9 r (and) s t-ita.300 @sf 9 r (ha) s t-rom.300 @sf 9 r (all) s 9 r (failed) s 9 r (to) s 9 r (infect) s 9 r 97 c 10 r (host,) s 1012 1771 p (then) s t-ita.300 @sf 14 r (hl) s t-rom.300 @sf 14 r (is) s 14 r (called) s 15 r (which) s 13 r (is) s 14 r (similar) s 14 r (to) s t-ita.300 @sf 14 r (ha) s t-rom.300 @sf 14 r (but) s 13 r (uses) s 15 r (for) s 14 r (local) s 1012 1820 p (interfaces) s 11 r (for) s 10 r 97 c 11 r (source) s 11 r (of) s 9 r (networks.) s 1054 1882 p (It) s 10 r (is) s 10 r (not) s 10 r (clear) s 11 r (that) s t-ita.300 @sf 10 r (ha) s t-rom.300 @sf 10 r (and) s t-ita.300 @sf 11 r (hl) s t-rom.300 @sf 10 r (worked.) s 14 r (Because) s t-ita.300 @sf 12 r (hn) s t-rom.300 @sf 10 r (returns) s 1012 1932 p (if) s 10 r (the) s 10 r (address) s 11 r (is) s 11 r (local,) s t-ita.300 @sf 10 r (hl) s t-rom.300 @sf 10 r (appears) s 11 r (to) s 10 r (have) s 11 r (no) s 10 r (chance) s 11 r (of) s 10 r (suc-) s 1012 1982 p (ceeding.) s 15 r (If) s 10 r (alternate) s 10 r (addresses) s 11 r (for) s 10 r (gateways) s 11 r (are) s 11 r (indeed) s 10 r (ob-) s 1012 2032 p (tained) s 12 r (by) s 11 r (other) s 11 r (parts) s 12 r (of) s 11 r (the) s 12 r (virus) s 11 r (then) s t-ita.300 @sf 11 r (ha) s t-rom.300 @sf 11 r (could) s 12 r (work.) s 17 r (But) s 1012 2082 p (if) s 10 r (only) s 9 r (the) s 9 r (addresses) s 12 r (in) s 9 r (the) s 10 r (routing) s 8 r (table) s 9 r (were) s 11 r (used) s 10 r (it) s 9 r (could) s 1012 2131 p (not) s 14 r (work,) s 16 r (since) s 15 r (by) s 14 r (de) s 174 c (nition) s 13 r (these) s 15 r (addresses) s 16 r (must) s 15 r (be) s 15 r (on) s 1012 2181 p 97 c 13 r (directly) s 11 r (connected) s 13 r (network.) s 19 r (Also,) s 12 r (in) s 12 r (our) s 11 r (monitoring) s 10 r (we) s 1012 2231 p (never) s 12 r (detected) s 12 r (an) s 11 r (attack) s 12 r (on) s 11 r 97 c 11 r (randomly) s 11 r (generated) s 12 r (address.) s 1012 2281 p (These) s 12 r (routines) s 9 r (do) s 10 r (not) s 9 r (seem) s 12 r (to) s 10 r (have) s 11 r (been) s 10 r (functional.) s t-bol.360 @sf 1012 2467 p (A.6) s 51 r (Attack) s 18 r 114 c (outines) s t-rom.300 @sf 1012 2568 p (There) s 11 r (are) s 11 r 97 c 11 r (collection) s 9 r (of) s 9 r (attack) s 11 r (routines,) s 9 r (all) s 10 r (of) s 9 r (which) s 10 r (try) s 9 r (to) s 1012 2617 p (obtain) s 8 r 97 c 8 r (Bourne) s 8 r (Shell) s 8 r (running) s 6 r (on) s 8 r (the) s 8 r (tar) s (geted) s 7 r (machine.) s 15 r (See) s 1012 2667 p (Appendix) s 9 r (A.7) s 10 r (for) s 9 r 97 c 10 r (description) s 8 r (of) s 9 r (the) s c-med.300 @sf 9 r (l1.c) s t-rom.300 @sf 10 r (program,) s 9 r (used) s 1012 2717 p (by) s 10 r (all) s 10 r (the) s 10 r (attack) s 11 r (routines.) s 954 2842 p (12) s @eop 13 @bop0 cmr7.300 @sf [<0FC01FE0387070387038F03CF03CF03CF03CF03CF03CF03CF03CF03C7038703838701FE00FC0> 14 19 -1 0 17] 48 @dc cmr6.300 @sf [<1F003F8071C060C0E0E0E0E0E0E0E0E0E0E0E0E0E0E0E0E060C071C03F801F00> 11 16 -1 0 15] 48 @dc 13 @bop1 t-bol.300 @sf -36 96 p (A.6.1) s 40 r (hu1) s t-rom.300 @sf -36 176 p (The) s t-ita.300 @sf 8 r (hu1) s t-rom.300 @sf 9 r (routine) s 8 r (is) s 8 r (called) s 10 r (by) s 8 r (the) s 9 r (Phase) s 10 r 49 c 9 r (and) s 9 r (Phase) s 11 r 51 c t-ita.300 @sf 8 r (crack-) s -36 226 p (some) s t-rom.300 @sf 9 r (subroutines.) s 13 r (Once) s 11 r 97 c 10 r (password) s 11 r (for) s 9 r (user) s 11 r (name) s 11 r (guessed) s -36 276 p (correctly) s -3 r 44 c 10 r (this) s 10 r (routine) s 10 r (is) s 11 r (called) s 11 r (with) s 10 r 97 c 12 r (host) s 10 r (name) s 12 r (read) s 12 r (from) s -36 326 p (either) s 12 r (the) s 13 r (user) s 2 r 39 c -1 r 115 c c-med.300 @sf 13 r (.forward) s t-rom.300 @sf 13 r (or) s c-med.300 @sf 13 r (.rhosts) s 14 r t-rom.300 @sf 174 c (les.) s 24 r (In) s 14 r (order) s -36 376 p (to) s 10 r (assume) s 14 r (the) s 12 r (user) s 2 r 39 c -1 r 115 c 10 r (id) s 12 r (it) s 11 r (then) s 12 r (tries) s 12 r (to) s 12 r (connect) s 12 r (to) s 12 r (the) s 12 r (local) s -36 425 p (machine') s -1 r 115 c c-med.300 @sf 7 r (rexec) s t-rom.300 @sf 9 r (server) s 9 r (using) s 8 r (the) s 9 r (guessed) s 10 r (name) s 10 r (and) s 9 r (pass-) s -36 475 p (word.) s 21 r (If) s 14 r (successful) s 14 r (it) s 12 r (runs) s 13 r (an) s c-med.300 @sf 14 r (rsh) s t-rom.300 @sf 13 r (to) s 13 r (the) s 13 r (tar) s (get) s 12 r (machine,) s -36 525 p (tryi) s -1 r (ng) s 7 r (to) s 9 r (execute) s 10 r 97 c 9 r (Bourne) s 9 r (Shell,) s 9 r (which) s 9 r (it) s 8 r (uses) s 10 r (to) s 8 r (send) s 10 r (over) s -36 575 p (and) s 9 r (compile) s 10 r (the) s c-med.300 @sf 10 r (l1.c) s t-rom.300 @sf 10 r (infection) s 9 r (program.) s t-bol.300 @sf -36 692 p (A.6.2) s 40 r (Hit) s 16 r (SMTP) s t-rom.300 @sf -36 772 p (This) s 9 r (routine) s 9 r (make) s 12 r 97 c 11 r (connection) s 10 r (to) s 10 r (TCP) s 10 r (port) s 10 r (25,) s 11 r (the) s 10 r (SMTP) s -36 822 p (port) s -1 r 44 c 10 r (of) s 11 r 97 c 12 r (remote) s 12 r (machine) s 12 r (and) s 11 r (used) s 12 r (it) s 10 r (to) s 11 r (take) s 11 r (advantage) s 12 r (of) s -36 872 p (the) s 13 r (sendmail) s 14 r (bug.) s 26 r (It) s 14 r (attempts) s 14 r (to) s 14 r (use) s 15 r (the) s 15 r (debug) s 14 r (option) s 12 r (to) s -36 922 p (make) s c-med.300 @sf 12 r (sendmail) s t-rom.300 @sf 13 r (run) s 12 r 97 c 13 r (command) s 14 r (\(the) s 13 r 96 c -2 r (`recipient') s -4 r 39 c 11 r (of) s 13 r (the) s -36 972 p (message\),) s 15 r (which) s 14 r (transfers) s 14 r (the) s c-med.300 @sf 14 r (l1.c) s t-rom.300 @sf 13 r (program) s 14 r (included) s 13 r (in) s -36 1021 p (the) s 9 r (body) s 9 r (of) s 10 r (the) s 10 r (message.) s t-bol.300 @sf -36 1139 p (A.6.3) s 40 r (Hit) s 16 r (\014nger) s t-rom.300 @sf -36 1219 p (The) s 9 r 96 c -2 r (`hit) s 7 r 174 c (nger) s 2 r 39 c -2 r 39 c 8 r (routine) s 9 r (tries) s 9 r (to) s 9 r (make) s 11 r 97 c 10 r (connection) s 9 r (to) s 9 r (TCP) s -36 1269 p (port) s 13 r (79,) s 17 r (the) s 15 r 174 c (nger) s 15 r (port,) s 16 r (of) s 15 r (the) s 16 r (remote) s 15 r (machine.) s 31 r (Then) s 15 r (it) s -36 1319 p (creates) s 10 r 97 c 11 r 96 c -2 r (`magic) s 9 r (packet') s -2 r 39 c 10 r (which) s 9 r (consists) s 10 r (of) s cmsy10.300 @sf 4 1370 p 15 c t-rom.300 @sf 21 r 65 c 17 r (400) s 16 r (byte) s 17 r 96 c -2 r (`runway') s -4 r 39 c 15 r (of) s 17 r 86 c -4 r (AX) s 16 r 96 c -2 r (`nop') s -4 r 39 c 15 r (instructions,) s 46 1420 p (which) s 9 r (can) s 11 r (be) s 11 r (executed) s 11 r (harmlessly) s -2 r 46 c cmsy10.300 @sf 4 1469 p 15 c t-rom.300 @sf 21 r 65 c 10 r (small) s 10 r (piece) s 10 r (of) s 10 r (code) s 10 r (which) s 10 r (executes) s 11 r 97 c 10 r (Bourne) s 10 r (Shell.) s cmsy10.300 @sf 4 1519 p 15 c t-rom.300 @sf 21 r 65 c 18 r (stack) s 18 r (frame,) s 22 r (with) s 17 r 97 c 19 r (return) s 17 r (address) s 19 r (which) s 18 r (would) s 46 1569 p (hopefully) s 8 r (point) s 9 r (into) s 9 r (the) s 10 r (code.) s 4 1620 p (Note) s 13 r (that) s 12 r (the) s 12 r (piece) s 14 r (of) s 12 r (code) s 14 r (is) s 12 r 86 c -4 r (AX) s 11 r (code,) s 15 r (and) s 13 r (the) s 12 r (stack) s -36 1670 p (frame) s 7 r (is) s 7 r 97 c 8 r 86 c -4 r (AX) s 6 r (frame,) s 9 r (in) s 7 r (the) s 7 r (wrong) s 7 r (order) s 7 r (for) s 7 r (the) s 7 r (Sun.) s 13 r (Thus,) s -36 1720 p (althou) s -1 r (gh) s 13 r (the) s 14 r (Sun) s 14 r 174 c (nger) s 15 r (daemon) s 15 r (has) s 15 r (the) s 14 r (same) s 16 r (bug) s 14 r (as) s 16 r (the) s -36 1770 p 86 c -4 r (A) s -1 r 88 c 8 r (one,) s 11 r (this) s 9 r (piece) s 11 r (of) s 10 r (code) s 11 r (cannot) s 10 r (exploit) s 9 r (it.) s 4 1821 p (The) s 12 r (attack) s 11 r (on) s 11 r (the) s 11 r 174 c (nger) s 11 r (daemon) s 12 r (is) s 11 r (clearly) s 11 r 97 c 11 r (lysogenetic) s -36 1871 p 96 c -2 r (`v) s -1 r (i) s -1 r (ral') s -3 r 39 c 15 r (attack) s 17 r (\(see) s 18 r (Section) s 16 r (1.2\),) s 19 r (since) s 17 r (although) s 15 r 97 c 18 r (worm) s -36 1920 p (doesn') s -1 r 116 c 14 r (modify) s 15 r (the) s 15 r (host) s 15 r (machine) s 17 r (at) s 16 r (all,) s 17 r (the) s 16 r 174 c (nger) s 15 r (attack) s -36 1970 p (does) s 10 r (modify) s 11 r (the) s 12 r (running) s 10 r 174 c (nger) s 11 r (daemon) s 12 r (process.) s 19 r (The) s 13 r 96 c -2 r (`in-) s -36 2020 p (jected) s 13 r (DNA) s -4 r 39 c -2 r 39 c 13 r (component) s 14 r (of) s 14 r (the) s 14 r (virus) s 14 r (contained) s 14 r (the) s 14 r 86 c -4 r (AX) s -36 2070 p (inst) s -1 r (ructio) s -1 r (ns) s 9 r (shown) s 9 r (in) s 10 r (Figure) s 10 r (2.) s 4 2121 p (The) s t-ita.300 @sf 19 r (execve) s t-rom.300 @sf 22 r (system) s 19 r (call) s 18 r (causes) s 20 r (the) s 19 r (current) s 18 r (process) s 19 r (to) s -36 2171 p (be) s 19 r (replaced) s 20 r (with) s 19 r (an) s 20 r (invocation) s 18 r (of) s 19 r (the) s 20 r (named) s 20 r (program;) s c-med.300 @sf -36 2221 p (/bin/sh) s t-rom.300 @sf 14 r (is) s 15 r (the) s 16 r (Bourne) s 15 r (Shell,) s 17 r 97 c 16 r (UNIX) s 16 r (command) s 17 r (inter-) s -36 2270 p (preter) s -2 r 46 c 12 r (In) s 7 r (this) s 8 r (case,) s 10 r (the) s 8 r (shell) s 8 r (winds) s 7 r (up) s 8 r (running) s 7 r (with) s 7 r (its) s 7 r (input) s -36 2320 p (coming) s 9 r (from,) s 11 r (and) s 11 r (its) s 10 r (output) s 9 r (going) s 10 r (to,) s 10 r (the) s 11 r (network) s 10 r (connec-) s -36 2370 p (tio) s -1 r (n.) s 24 r (The) s 15 r (virus) s 14 r (then) s 14 r (sends) s 14 r (over) s 14 r (the) s c-med.300 @sf 14 r (l1.c) s t-rom.300 @sf 14 r (bootstrap) s 13 r (pro-) s -36 2420 p (gram.) s t-bol.300 @sf -36 2537 p (A.6.4) s 40 r (Hit) s 16 r (rsh) s t-rom.300 @sf -36 2617 p (This) s 9 r (unlabeled) s 11 r (routine) s 9 r (tries) s c-med.300 @sf 11 r (rsh) s t-rom.300 @sf 10 r (to) s 11 r (the) s 10 r (tar) s (get) s 10 r (host) s 10 r (\(assum-) s -36 2667 p (ing) s 9 r (it) s 10 r (can) s 12 r (get) s 11 r (in) s 10 r (as) s 12 r (the) s 11 r (current) s 11 r (user\).) s 17 r (It) s 10 r (tries) s 11 r (three) s 11 r (dif) s (ferent) s -36 2717 p (names) s 10 r (for) s 10 r (the) s c-med.300 @sf 10 r (rsh) s t-rom.300 @sf 10 r (binary) s -2 r 44 c cmsy10.300 @sf 1054 96 p 15 c c-med.300 @sf 20 r (/usr/ucb/rsh) s cmsy10.300 @sf 1054 146 p 15 c c-med.300 @sf 20 r (/usr/bin/rsh) s cmsy10.300 @sf 1054 196 p 15 c c-med.300 @sf 20 r (/bin/rsh) s t-rom.300 @sf 1012 246 p (If) s 12 r (one) s 12 r (of) s 12 r (them) s 12 r (succeeds,) s 14 r (it) s 11 r (tries) s 12 r (to) s 11 r (resynchronize) s 12 r (\(see) s 13 r (Ap-) s 1012 295 p (pendix) s 7 r (A.8.1\)) s 9 r (the) s 7 r (connection;) s 8 r (if) s 7 r (that) s 7 r (doesn') s 116 c 7 r (succeed) s 9 r (within) s 1012 345 p (thirty) s 7 r (seconds) s 10 r (it) s 8 r (kills) s 7 r (of) s 102 c 8 r (the) s 8 r (child) s 8 r (process.) s 15 r (If) s 8 r (successful) s 10 r (the) s 1012 395 p (connection) s 8 r (can) s 8 r (then) s 8 r (be) s 8 r (used) s 8 r (to) s 7 r (launch) s 8 r (the) s c-med.300 @sf 7 r (l1.c) s t-rom.300 @sf 8 r 96 c -2 r (`grappl) s -1 r (ing) s 1012 445 p (hook') s -2 r 39 c 8 r (program) s 10 r (at) s 11 r (the) s 10 r (victim.) s 1054 495 p (Note) s 16 r (that) s 15 r (this) s 15 r (infection) s 15 r (method) s 16 r (doesn') s 116 c 15 r (specify) s 16 r 97 c 16 r (user) s 1012 545 p (name) s 14 r (to) s 12 r (attack;) s 13 r (if) s 12 r (it) s 12 r (gets) s 12 r (into) s 12 r (the) s 12 r (remote) s 13 r (account,) s 13 r (it) s 12 r (is) s 12 r (be-) s 1012 594 p (cause) s 9 r (the) s 7 r (user) s 7 r (that) s 6 r (the) s 7 r (virus) s 6 r (is) s 7 r (running) s 5 r (as) s 8 r (also) s 7 r (has) s 7 r (an) s 7 r (account) s 1012 644 p (on) s 10 r (the) s 10 r (other) s 10 r (machine) s 10 r (which) s 10 r (trusts) s 9 r (the) s 10 r (originatin) s -1 r 103 c 8 r (machine.) s t-bol.300 @sf 1012 755 p (A.6.5) s 42 r (Hit) s 16 r 114 c (exec) s t-rom.300 @sf 1012 833 p (The) s t-ita.300 @sf 19 r (hit) s 17 r 114 c -1 r (exec) s t-rom.300 @sf 20 r (routine) s 17 r (uses) s 19 r (the) s 18 r (remote) s 18 r (execution) s 18 r (system) s 1012 883 p (which) s 10 r (is) s 10 r (similar) s 9 r (to) s c-med.300 @sf 9 r (rsh) s t-rom.300 @sf 44 c 10 r (but) s 9 r (designed) s 10 r (for) s 9 r (use) s 11 r (by) s 9 r (programs.) s 1012 932 p (It) s 17 r (connects) s 17 r (and) s 16 r (sends) s 17 r (the) s 17 r (user) s 17 r (name,) s 19 r (the) s 17 r (password,) s 19 r (and) s c-med.300 @sf 1012 982 p (/bin/sh) s t-rom.300 @sf 10 r (as) s 11 r (the) s 10 r (command) s 11 r (to) s 10 r (execute.) s t-bol.300 @sf 1012 1093 p (A.6.6) s 42 r (makemagic) s t-rom.300 @sf 1012 1171 p (This) s 10 r (routine) s 8 r (tries) s 9 r (to) s 8 r (make) s 11 r 97 c 9 r (telnet) s 9 r (connection) s 9 r (to) s 8 r (each) s 11 r (of) s 9 r (the) s 1012 1221 p (available) s 10 r (addresses) s 10 r (for) s 9 r (the) s 9 r (current) s 9 r (victim.) s 13 r (It) s 9 r (broke) s 9 r (the) s 9 r (con-) s 1012 1271 p (nections) s 15 r (immediately) s -2 r 44 c 15 r (often) s 15 r (producing) s 13 r (error) s 14 r (reports) s 15 r (from) s 1012 1320 p (the) s 10 r (telnet) s 9 r (daemon,) s 11 r (which) s 9 r (were) s 10 r (recorded,) s 11 r (and) s 9 r (provide) s 9 r (some) s 1012 1370 p (of) s 10 r (the) s 11 r (earliest) s 10 r (reports) s 9 r (of) s 10 r (attack) s 11 r (attempts.) s cmr7.300 @sf 1680 1356 p (10) s t-rom.300 @sf 1054 1420 p (If) s 11 r (it) s 10 r (succeedes) s 14 r (in) s 10 r (reaching) s 12 r (the) s 11 r (host,) s 11 r (it) s 10 r (creates) s 13 r 97 c 12 r (TCP) s 11 r (lis-) s 1012 1470 p (tener) s 10 r (on) s 9 r 97 c 10 r (random) s 9 r (port) s 8 r (number) s 10 r (which) s 8 r (the) s 10 r (infected) s 9 r (machine) s 1012 1520 p (would) s 10 r (eventually) s 9 r (connect) s 10 r (back) s 11 r (to.) s t-bol.360 @sf 1012 1639 p (A.7) s 51 r (Grappling) s 17 r (Hook) s t-rom.300 @sf 1012 1717 p 65 c 14 r (short) s 12 r (program,) s 14 r (named) s c-med.300 @sf 14 r (l1.c) s t-rom.300 @sf 44 c 14 r (is) s 13 r (the) s 13 r (common) s 13 r (grappling) s 1012 1766 p (hook) s 11 r (that) s 10 r (all) s 11 r (of) s 10 r (the) s 11 r (attack) s 11 r (routines) s 10 r (use) s 12 r (to) s 10 r (pull) s 10 r (over) s 11 r (the) s 11 r (rest) s 1012 1816 p (of) s 9 r (the) s 8 r (virus.) s 13 r (It) s 8 r (is) s 8 r (robustly) s 7 r (written,) s 8 r (and) s 8 r (fairly) s 8 r (portable.) s 12 r (It) s 8 r (ran) s 1012 1866 p (on) s 11 r 97 c 10 r (number) s 11 r (of) s 10 r (machines) s 11 r (which) s 10 r (were) s 11 r (neither) s 10 r 86 c -4 r (AX) s 9 r (or) s 10 r (Sun,) s 1012 1916 p (loading) s 11 r (them) s 11 r (down) s 11 r (as) s 12 r (well,) s 12 r (but) s 10 r (only) s 11 r (making) s 11 r (them) s 12 r (periph-) s 1012 1966 p (eral) s 11 r (victims) s 10 r (of) s 10 r (the) s 10 r (virus.) s 1054 2016 p (The) s 11 r 174 c (rst) s 11 r (thing) s 9 r (it) s 10 r (does) s 11 r (is) s 10 r (delete) s 11 r (the) s 11 r (binary) s 10 r (it) s 10 r (was) s 11 r (running) s 1012 2065 p (from.) s 16 r (It) s 10 r (checks) s 12 r (that) s 10 r (it) s 9 r (has) s 12 r (three) s 10 r (ar) s (guments) s 10 r (\(exiting) s 9 r (if) s 10 r (there) s 1012 2115 p (aren') s 116 c 11 r (three) s 11 r (of) s 11 r (them\).) s 17 r (It) s 11 r (closes) s 12 r (all) s 11 r 174 c (le) s 11 r (descriptors) s 11 r (and) s 11 r (then) s 1012 2165 p (forks,) s 11 r (exiting) s 9 r (if) s 10 r (the) s 10 r (fork) s 10 r (fails.) s 14 r (If) s 10 r (it) s 10 r (succeeds,) s 13 r (the) s 10 r (parent) s 10 r (ex-) s 1012 2215 p (its;) s 9 r (this) s 8 r (leaves) s 10 r (no) s 8 r (connection) s 9 r (from) s 9 r (the) s 8 r (child) s 9 r (to) s 8 r (the) s 9 r (infection) s 1012 2265 p (route.) s 1054 2315 p (Next,) s 17 r (it) s 15 r (creates) s 16 r 97 c 16 r (TCP) s 16 r (connection) s 15 r (back) s 16 r (to) s 15 r (the) s 15 r (address) s 1012 2364 p (given) s 7 r (as) s 9 r (the) s 7 r 174 c (rst) s 8 r (ar) s (gument,) s 7 r (and) s 8 r (the) s 7 r (port) s 7 r (given) s 7 r (as) s 8 r (the) s 8 r (second.) s 1012 2414 p (Then) s 16 r (it) s 15 r (sends) s 16 r (over) s 15 r (the) s 15 r (magic) s 16 r (number) s 16 r (given) s 14 r (as) s 16 r (the) s 16 r (third.) s 1012 2464 p (The) s 12 r (text) s 11 r (of) s 11 r (each) s 12 r (ar) s (gument) s 11 r (is) s 11 r (erased) s 12 r (immediately) s 11 r (after) s 11 r (it) s 11 r (is) s 1012 2514 p (used.) s 14 r (The) s 7 r (stream) s 8 r (connection) s 7 r (is) s 6 r (then) s 7 r (reused) s 8 r (as) s 7 r (the) s 7 r (program') s -1 r 115 c 1012 2564 p (standard) s 10 r (input) s 9 r (and) s 11 r (output.) s 1012 2600 p 390 2 ru cmr6.300 @sf 1040 2627 p (10) s t-rom.240 @sf 1072 2638 p (On) s 6 r (fast) s 6 r (machines,) s 6 r (such) s 5 r (as) s 6 r (the) s 6 r (DEC) s 6 r 86 c -3 r (AX) s 5 r (3200,) s 6 r (there) s 5 r (may) s 6 r (be) s 5 r (no) s 6 r (record) s 1012 2678 p (of) s 9 r (these) s 9 r (attacks,) s 8 r (since) s 9 r (the) s 8 r (connection) s 7 r (is) s 10 r (handed) s 7 r (of) s 102 c 8 r (fast) s 9 r (enough) s 7 r (to) s 9 r (satisfy) s 1012 2717 p (the) s 8 r (daemon.) s t-rom.300 @sf 954 2842 p (13) s @eop 14 @bop0 /Courier /c-med.240 ReEncodeForTeX /c-med.240 /c-med.240 33.208800 TeXPSmakefont def 14 @bop1 c-med.300 @sf 162 124 p (pushl) s 74 r ($68732f) s 223 r (push) s 25 r ('/sh<NUL>') s 162 174 p (pushl) s 74 r ($6e69622f) s 173 r (push) s 25 r ('/bin') s 162 224 p (movl) s 99 r (sp,r10) s 248 r (save) s 25 r (address) s 24 r (of) s 25 r (start) s 24 r (of) s 25 r (string) s 162 273 p (pushl) s 74 r ($0) s 348 r (push) s 25 r 48 c 25 r (\(arg) s 24 r 51 c 25 r (to) s 25 r (execve\)) s 162 323 p (pushl) s 74 r ($0) s 348 r (push) s 25 r 48 c 25 r (\(arg) s 24 r 50 c 25 r (to) s 25 r (execve\)) s 162 373 p (pushl) s 74 r (r10) s 323 r (push) s 25 r (string) s 24 r (addr) s 25 r (\(arg) s 24 r 49 c 25 r (to) s 25 r (execve\)) s 162 423 p (pushl) s 74 r ($3) s 348 r (push) s 25 r (argument) s 24 r (count) s 162 473 p (movl) s 99 r (sp,ap) s 273 r (set) s 25 r (argument) s 24 r (pointer) s 162 522 p (chmk) s 99 r ($3b) s 323 r (do) s 25 r ("execve") s 24 r (kernel) s 25 r (call.) s t-rom.300 @sf 556 655 p (Figure) s 10 r (2:) s 13 r 86 c -4 r (AX) s 9 r (intructions) s 8 r (for) s 10 r (the) s c-med.300 @sf 10 r (finger) s t-rom.300 @sf 10 r (attack.) s 4 789 p 65 c 15 r (loop) s 15 r (reads) s 16 r (in) s 15 r 97 c 16 r (length) s 14 r (\(as) s 16 r 97 c 16 r (network) s 14 r (byte) s 15 r (order) s 15 r (32-) s -36 839 p (bit) s 11 r (integer\)) s 13 r (and) s 14 r (then) s 13 r 97 c 14 r 174 c (lename.) s 26 r (The) s 14 r 174 c (le) s 14 r (is) s 13 r (unlinked) s 13 r (and) s -36 888 p (opened) s 7 r (for) s 9 r (write,) s 8 r (and) s 9 r (then) s 9 r (the) s 8 r 174 c (le) s 9 r (itself) s 8 r (is) s 9 r (read) s 9 r (in) s 8 r (\(using) s 8 r (the) s -36 938 p (number) s 12 r (of) s 14 r (bytes) s 14 r (read) s 15 r (in) s 13 r (earlier) s -1 r (.\)) s 24 r (On) s 14 r (any) s 14 r (error) s -1 r 44 c 14 r (all) s 14 r (of) s 14 r (the) s -36 988 p 174 c (les) s 9 r (are) s 11 r (unlinked.) s 13 r (If) s 10 r (the) s 10 r (length) s 9 r (read) s 10 r (in) s 10 r (is) s 10 r (-1,) s 10 r (the) s 11 r (loop) s 9 r (exits,) s -36 1038 p (and) s 9 r 97 c 11 r (Bourne) s 9 r (Shell) s 10 r (is) s 10 r (executed) s 11 r (\(replacing) s 10 r (the) s c-med.300 @sf 10 r (l1) s t-rom.300 @sf 10 r (program,) s -36 1088 p (and) s 9 r (getting) s 9 r (its) s 9 r (input) s 9 r (from) s 10 r (the) s 10 r (same) s 12 r (source.\)) s t-bol.360 @sf -36 1231 p (A.8) s 49 r (Install) s 18 r (Routines) s t-rom.300 @sf -36 1318 p (There) s 14 r (are) s 15 r 97 c 14 r (variety) s 14 r (of) s 14 r (routines) s 13 r (used) s 14 r (to) s 14 r (actually) s 13 r (move) s 15 r (the) s -36 1368 p (viru) s -1 r 115 c 13 r (from) s 14 r (one) s 14 r (machine) s 15 r (to) s 14 r (the) s 14 r (other) s -1 r 46 c 24 r (They) s 15 r (deal) s 15 r (with) s 13 r (the) s -36 1417 p 96 c -2 r (`v) s -1 r (i) s -1 r (rus) s 14 r (protocol') s -3 r 39 c 13 r (connection) s 15 r (made) s 16 r (by) s 16 r (the) s c-med.300 @sf 15 r (l1.c) s t-rom.300 @sf 15 r (injected) s -36 1467 p (progr) s -1 r (am) s 10 r (or) s 9 r (with) s 10 r (the) s 10 r (shell) s 10 r (that) s 9 r (it) s 10 r (spawns.) s t-bol.300 @sf -36 1603 p (A.8.1) s 40 r 114 c (esynch) s t-rom.300 @sf -36 1689 p (The) s t-ita.300 @sf 9 r 114 c -1 r (esynch) s t-rom.300 @sf 11 r (routine) s 9 r (sends) s 10 r (commands) s 12 r (to) s 9 r 97 c 11 r (remote) s 10 r (shell,) s 10 r (re-) s -36 1739 p (questin) s -1 r 103 c 8 r (that) s 8 r (it) s 9 r (echo) s 10 r (back) s 9 r 97 c 10 r (speci) s 174 c 99 c 11 r (randomly) s 8 r (chosen) s 10 r (num-) s -36 1789 p (ber) s -2 r 46 c 18 r (It) s 12 r (then) s 12 r (waits) s 12 r 97 c 12 r (certain) s 13 r (amount) s 11 r (of) s 12 r (time) s 12 r (for) s 12 r 97 c 13 r (response.) s -36 1838 p (This) s 12 r (routine) s 13 r (is) s 14 r (used) s 14 r (to) s 13 r (indicate) s 14 r (when) s 14 r (the) s 13 r (various) s 14 r (subpro-) s -36 1888 p (grams) s 6 r (of) s 7 r (the) s 8 r (infection) s 6 r (procedure) s 7 r (have) s 8 r (compiled) s 7 r (or) s 7 r (executed) s -36 1938 p (and) s 9 r 97 c 11 r (Bourne) s 9 r (Shell) s 10 r (prompt) s 9 r (is) s 10 r (available) s 11 r (again.) s t-bol.300 @sf -36 2074 p (A.8.2) s 40 r (waithit) s t-rom.300 @sf -36 2160 p (This) s 8 r (routine) s 8 r (does) s 10 r (much) s 10 r (of) s 10 r (the) s 9 r (high) s 9 r (level) s 9 r (work.) s 14 r (It) s 9 r (waits) s 9 r (\(up) s -36 2210 p (to) s 9 r 50 c 10 r (minutes\)) s 10 r (for) s 10 r 97 c 12 r (return) s 10 r (connection) s 10 r (from) s 10 r 97 c 11 r (victim) s 10 r (\(which) s -36 2260 p (has) s 9 r (had) s c-med.300 @sf 10 r (l1.c) s t-rom.300 @sf 10 r (injected) s 9 r (into) s 9 r (it.\)) s 13 r (It) s 9 r (then) s 10 r (tries) s 10 r (to) s 9 r (read) s 10 r 97 c 11 r (magic) s -36 2309 p (number) s 8 r (\(which) s 9 r (had) s 10 r (been) s 10 r (previously) s 9 r (sent) s 9 r (to) s 9 r (that) s 10 r (victim) s 9 r (as) s 10 r 97 c -36 2359 p (command) s 12 r (line) s 12 r (ar) s (gument) s 12 r (to) s 13 r (the) s c-med.300 @sf 12 r (l1) s t-rom.300 @sf 13 r (program\)) s 12 r (and) s 13 r (gives) s 13 r (up) s -36 2409 p (after) s 9 r (ten) s 10 r (seconds.) s 4 2463 p (After) s 7 r (the) s 7 r (connection) s 6 r (is) s 7 r (established,) s 8 r (all) s 7 r (of) s 7 r (the) s 7 r (current) s 7 r 96 c -2 r (`ob-) s -36 2513 p (jects') s -3 r 39 c 11 r (in) s 12 r (storage) s 13 r (in) s 12 r (the) s 12 r (virus) s 12 r (are) s 13 r (fed) s 13 r (down) s 12 r (the) s 12 r (connection) s -36 2563 p (int) s -1 r 111 c 8 r (the) s 9 r (victim.) s 13 r (Then) s 10 r (it) s 9 r (tries) s 9 r (to) s 9 r (resynchronize,) s 10 r (and) s 10 r (if) s 9 r (it) s 8 r (suc-) s -36 2613 p (ceeds,) s 10 r (sends) s 11 r (down) s 10 r (commands) s 11 r (to) s cmsy10.300 @sf 4 2667 p 15 c t-rom.300 @sf 21 r (set) s 10 r (the) s c-med.300 @sf 10 r (PATH) s t-rom.300 @sf 10 r (of) s 10 r (the) s 10 r (victim) s 10 r (shell) s cmsy10.300 @sf 4 2717 p 15 c t-rom.300 @sf 21 r (try) s 9 r (to) s 10 r (delete) s c-med.300 @sf 10 r (sh) s t-rom.300 @sf 10 r (in) s 10 r (the) s 10 r (current) s 10 r (directory) s 9 r 40 c c-med.300 @sf (/usr/tmp) s t-rom.300 @sf 41 c cmsy10.300 @sf 1054 789 p 15 c t-rom.300 @sf 20 r (if) s 8 r (the) s 7 r (delete) s 9 r (fails,) s 8 r (pick) s 7 r 97 c 9 r (random) s 7 r (name) s 9 r (to) s 7 r (use) s 9 r (instead) s cmr7.300 @sf 1952 775 p (11) s cmsy10.300 @sf 1054 839 p 15 c t-rom.300 @sf 20 r (scan) s 15 r (the) s 14 r (list) s 13 r (of) s 14 r (objects,) s 15 r (looking) s 11 r (for) s 14 r (names) s 15 r (ending) s 13 r (in) s c-med.300 @sf 1095 888 p (.o) s cmsy10.300 @sf 1054 938 p 15 c t-rom.300 @sf 20 r (link) s 10 r (and) s 11 r (run) s 10 r (each) s 12 r (of) s 11 r (these,) s 12 r (with) s 10 r (the) s 10 r (command) s 12 r (line) s 10 r (ar) s 45 c 1095 988 p (guments) s cmsy10.300 @sf 1145 1038 p 15 c c-med.300 @sf 21 r (-p) s 25 r ($$) s t-rom.300 @sf 44 c 10 r (where) s c-med.300 @sf 10 r ($$) s t-rom.300 @sf 9 r (is) s 10 r (the) s 9 r (process) s 10 r (id) s 10 r (of) s 9 r (the) s 9 r (victim) s 1187 1088 p (shell) s cmsy10.300 @sf 1145 1138 p 15 c t-rom.300 @sf 21 r (each) s 11 r (object) s 10 r (name) s cmsy10.300 @sf 1054 1187 p 15 c t-rom.300 @sf 20 r (resynchronize;) s 12 r (if) s 11 r (this) s 10 r (fails,) s 12 r (assume) s 13 r (that) s 11 r (the) s 11 r (virus) s 10 r (suc-) s 1095 1237 p (ceeded) s 15 r (\(since) s 13 r (the) s c-med.300 @sf 13 r (-p) s t-rom.300 @sf 13 r (option) s 12 r (tells) s 12 r (the) s 13 r (virus) s 13 r (to) s 12 r (kill) s 12 r (of) s 102 c 1095 1287 p (the) s 10 r (parent) s 10 r (shell\)) s 10 r (and) s 10 r (set) s 10 r 175 c (ag) s 10 r (bit) s 9 r 49 c 10 r (of) s 10 r (the) s 10 r (host) s 9 r (list) s 9 r (entry) s 1095 1337 p (\(the) s 10 r (host) s 10 r (list) s 9 r (is) s 10 r (detailed) s 10 r (in) s 10 r (section) s 10 r (A.9\).) s cmsy10.300 @sf 1054 1387 p 15 c t-rom.300 @sf 20 r (delete) s 16 r (the) s 15 r (compiled) s 15 r (program,) s 16 r (and) s 16 r (go) s 14 r (on) s 15 r (to) s 15 r (the) s 15 r (next) s 1095 1436 p (object.) s 1054 1487 p (Thus,) s 21 r (to) s 18 r (add) s 18 r (another) s 18 r (machine) s 19 r (type,) s 20 r (the) s 19 r (virus) s 17 r (merely) s 1012 1536 p (needs) s 11 r (to) s 10 r (be) s 10 r (started) s 10 r (with) s 9 r 97 c 11 r (new) s 10 r (object) s 10 r (binary) s 9 r (as) s 11 r 97 c 11 r (command) s 1012 1586 p (line) s 13 r (option,) s 13 r (which) s 13 r (will) s 12 r (then) s 12 r (be) s 14 r (propagated) s 13 r (to) s 12 r (the) s 13 r (next) s 13 r (in-) s 1012 1636 p (fected) s 11 r (host) s 10 r (and) s 10 r (tried.) s 1054 1686 p (Note) s 29 r (that) s 28 r (the) s 29 r (path) s 28 r (used) s 29 r (here) s 30 r (was) s c-med.300 @sf 29 r (PATH=) s 29 r (bin:) s 1012 1736 p (/usr/bin:) s 96 r (/usr/ucb) s t-rom.300 @sf 14 r (which) s 14 r (is) s 15 r (certainly) s 13 r (reason-) s 1012 1786 p (able) s 17 r (on) s 17 r (most) s 16 r (systems.) s 35 r (This) s 16 r (protects) s 17 r (systems) s 17 r (with) s 16 r 96 c -2 r (`un-) s 1012 1836 p (usual') s -2 r 39 c 9 r 174 c (lesystem) s 12 r (layouts,) s 10 r (and) s 10 r (suggests) s 11 r (that) s 10 r (complete) s 11 r (con-) s 1012 1885 p (sistency) s 11 r (among) s 10 r (systems) s 11 r (makes) s 11 r (them) s 11 r (more) s 10 r (vulnerable.) s t-bol.360 @sf 1012 2006 p (A.9) s 51 r (Host) s 18 r (modules) s t-rom.300 @sf 1012 2084 p (These) s 15 r (are) s 14 r 97 c 14 r (set) s 14 r (of) s 13 r (routines) s 13 r (designed) s 13 r (to) s 13 r (collect) s 13 r (names) s 15 r (and) s 1012 2134 p (addresses) s 14 r (of) s 13 r (tar) s (get) s 12 r (hosts) s 12 r (in) s 12 r 97 c 13 r (master) s 14 r (list.) s 21 r (Each) s 13 r (entry) s 13 r (con-) s 1012 2184 p (tains) s 13 r (up) s 13 r (to) s 12 r (six) s 13 r (addresses,) s 16 r (up) s 12 r (to) s 13 r (twelve) s 13 r (names,) s 15 r (and) s 13 r 97 c 14 r 175 c (ags) s 1012 2233 p 174 c (eld.) s t-bol.300 @sf 1012 2345 p (A.9.1) s 42 r (Name) s 16 r (to) s 15 r (host) s t-rom.300 @sf 1012 2424 p (This) s 13 r (routine) s 10 r (searches) s 14 r (the) s 12 r (host) s 12 r (list) s 11 r (for) s 12 r 97 c 12 r (given) s 12 r (named) s 13 r (host,) s 1012 2473 p (returns) s 10 r (the) s 11 r (list) s 9 r (entry) s 10 r (describing) s 10 r (it,) s 10 r (and) s 11 r (optionall) s -1 r 121 c 9 r (adds) s 10 r (it) s 10 r (to) s 1012 2523 p (the) s 11 r (list) s 9 r (if) s 9 r (it) s 10 r (isn') s 116 c 8 r (there) s 11 r (already) s -2 r 46 c 1012 2560 p 390 2 ru cmr6.300 @sf 1040 2588 p (11) s t-rom.240 @sf 1072 2599 p (Since) s 8 r (the) s 8 r (delete) s 8 r (command) s 6 r (used) s 7 r 40 c c-med.240 @sf (rm) s 20 r (-f) s t-rom.240 @sf 41 c 9 r (did) s 7 r (not) s 8 r (remove) s 7 r (directories,) s 1012 2638 p (creating) s 10 r 97 c 9 r (directory) s c-med.240 @sf 9 r (/usr/tmp/sh) s t-rom.240 @sf 10 r (stoped) s 8 r (the) s 10 r (virus[) s (22) s -1 r (].) s 17 r (However) s -1 r 44 c 9 r (the) s 1012 2678 p (virus) s 10 r (would) s 10 r (still) s 11 r (use) s 10 r (CPU) s 11 r (resources) s 9 r (attempting) s 10 r (to) s 10 r (link) s 10 r (the) s 10 r (objects,) s 11 r (even) s 1012 2717 p (though) s 7 r (it) s 9 r (couldn') s 116 c 6 r (write) s 9 r (to) s 8 r (the) s 8 r (output) s 7 r 174 c (le) s 9 r (\(since) s 7 r (it) s 9 r (was) s 8 r 97 c 8 r (directory\).) s t-rom.300 @sf 954 2842 p (14) s @eop 15 @bop0 /cmr8.300 @newfont cmr8.300 @sf [<0FC03FF07838700CE00EE00EE00EE03E70FC3DFC1FF80FE03FF03F387C1C701C701C701C38381FF007C0> 15 21 -1 0 18] 56 @dc [<06000F000F000F000F000F00070007000700030003800180018000C00060C030C018E0187FFC7FFE7FFE6000> 15 22 -2 0 18] 55 @dc [<03FE03FE0070007000700070FFFEFFFEE0707070307018701C700E700670077003F001F000F000F00070> 15 21 -1 0 18] 52 @dc [<07C01FF03C38381C701E701EF01EF01EF01EF81CF81CFFF8F7F0F08070007018383C1C3C0E1C07F801F0> 15 21 -1 0 18] 54 @dc [<1F803FC070F078387838301C001C021E1FDE3FFE703E703EF01EF01EF01EF01CF01C703838381FF007C0> 15 21 -1 0 18] 57 @dc /cmmi8.300 @newfont cmmi8.300 @sf [<40603030181878F8F8F070> 5 11 -2 6 10] 59 @dc cmr8.300 @sf [<1F003FC060E0F070F078F078607800780078607070E07FC06F8060006000600060007F807FE07FF06030> 13 21 -2 0 18] 53 @dc [<0FC03FF07038F83CF81EF81E701E001E003C007807E007E000F00078103C783C783C783C30781FF00FC0> 15 21 -1 0 18] 51 @dc [<7FF07FF0070007000700070007000700070007000700070007000700070007000700F700FF000F000300> 12 21 -2 0 18] 49 @dc [<07C01FF03C78783C701C701CF01EF01EF01EF01EF01EF01EF01EF01EF01E701C701C783C3C781FF007C0> 15 21 -1 0 18] 48 @dc [<FFF0FFF07FF0303818180C180E000700038001C000E000F0007800787078F878F878F8F071F03FE01F80> 13 21 -2 0 18] 50 @dc 15 @bop1 t-bol.300 @sf -36 96 p (A.9.2) s 40 r (Addr) s (ess) s 17 r (to) s 15 r (host) s t-rom.300 @sf -36 174 p (This) s 9 r (routine) s 10 r (searches) s 12 r (the) s 11 r (host) s 10 r (list) s 10 r (for) s 10 r 97 c 11 r (given) s 10 r (host) s 11 r (address,) s -36 224 p (returns) s 8 r (the) s 11 r (list) s 9 r (entry) s 10 r (describing) s 10 r (it,) s 10 r (and) s 11 r (optionall) s -1 r 121 c 9 r (adds) s 10 r (it) s 10 r (to) s -36 273 p (the) s 9 r (list) s 9 r (if) s 9 r (it) s 10 r (isn') s 116 c 8 r (there) s 11 r (already) s -2 r 46 c t-bol.300 @sf -36 382 p (A.9.3) s 40 r (Add) s 16 r (addr) s (ess/name) s t-rom.300 @sf -36 460 p (These) s 8 r (two) s 8 r (routines) s 7 r (added) s 9 r (an) s 9 r (address) s 9 r (or) s 8 r 97 c 9 r (name) s 10 r (to) s 8 r 97 c 9 r (host) s 8 r (list) s -36 509 p (entry) s -3 r 44 c 10 r (checking) s 11 r (to) s 11 r (make) s 12 r (sure) s 12 r (that) s 11 r (the) s 11 r (address) s 12 r (or) s 11 r (name) s 12 r (was) s -36 559 p (not) s 8 r (already) s 10 r (known.) s t-bol.300 @sf -36 668 p (A.9.4) s 40 r (Clean) s 16 r (up) s 16 r (table) s t-rom.300 @sf -36 745 p (This) s 10 r (routine) s 11 r (cycles) s 13 r (through) s 10 r (the) s 12 r (host) s 11 r (list,) s 12 r (and) s 12 r (removes) s 13 r (any) s -36 795 p (hosts) s 7 r (which) s 8 r (only) s 8 r (have) s 9 r 175 c (ag) s 10 r (bits) s 8 r 49 c 8 r (and) s 9 r 50 c 9 r (set) s 9 r (\(and) s 9 r (clears) s 10 r (those) s -36 845 p (bit) s -1 r (s.\)) s 22 r (Bit) s 13 r 49 c 13 r (is) s 14 r (set) s 14 r (when) s 13 r 97 c 14 r (resynchronize) s 14 r (\(in) s t-ita.300 @sf 13 r (waithit) s t-rom.300 @sf -1 r 41 c 12 r (fails,) s -36 895 p (probabl) s -1 r 121 c 12 r (indicating) s 12 r (that) s 14 r (this) s 13 r (host) s 13 r 96 c -2 r (`got) s 12 r (lost') s -2 r (') s -1 r 46 c 24 r (Bit) s 13 r 50 c 14 r (is) s 13 r (set) s -36 945 p (when) s 10 r 97 c 12 r (named) s 13 r (host) s 11 r (has) s 12 r (no) s 11 r (addresses,) s 14 r (or) s 11 r (when) s 12 r (several) s 13 r (dif-) s -36 994 p (ferent) s 9 r (attack) s 11 r (attempts) s 11 r (fail.) s 15 r (Bit) s 9 r 51 c 11 r (is) s 10 r (set) s 11 r (when) s 11 r (Phase) s 12 r 48 c 10 r (of) s 11 r (the) s -36 1044 p (crack) s 7 r (routines) s 7 r (successfully) s 8 r (retrieves) s 8 r (an) s 8 r (address) s 8 r (for) s 7 r (the) s 8 r (host.) s t-bol.300 @sf -36 1153 p (A.9.5) s 40 r (Get) s 17 r (addr) s (esses) s t-rom.300 @sf -36 1230 p (This) s 9 r (routine) s 10 r (takes) s 11 r (an) s 11 r (entry) s 10 r (in) s 10 r (the) s 11 r (host) s 10 r (table) s 11 r (and) s 11 r (tries) s 10 r (to) s 10 r 174 c (ll) s -36 1280 p (in) s 9 r (the) s 10 r (the) s 10 r (gaps.) s 16 r (It) s 10 r (looks) s 9 r (up) s 11 r (an) s 11 r (address) s 11 r (for) s 10 r 97 c 11 r (name) s 12 r (it) s 9 r (has,) s 12 r (or) s -36 1330 p (look) s -1 r 115 c 12 r (up) s 13 r 97 c 14 r (name) s 14 r (for) s 13 r (the) s 13 r (addresses) s 15 r (it) s 12 r (has.) s 24 r (It) s 13 r (also) s 13 r (includes) s -36 1380 p (any) s 9 r (aliases) s 11 r (it) s 9 r (can) s 11 r 174 c (nd.) s t-bol.360 @sf -36 1497 p (A.10) s 49 r (Object) s 17 r 114 c (outines) s t-rom.300 @sf -36 1574 p (These) s 14 r (routines) s 14 r (are) s 15 r (what) s 14 r (the) s 15 r (system) s 15 r (uses) s 15 r (to) s 14 r (pull) s 13 r (all) s 14 r (of) s 14 r (its) s -36 1624 p (pieces) s 12 r (into) s 11 r (memory) s 12 r (when) s 13 r (it) s 11 r (starts) s 12 r (\(after) s 13 r (the) s 12 r (host) s 11 r (has) s 13 r (been) s -36 1674 p (infected\)) s 7 r (and) s 9 r (then) s 9 r (to) s 8 r (retrieve) s 9 r (them) s 10 r (to) s 8 r (transmit) s 8 r (to) s 9 r (any) s 9 r (host) s 8 r (it) s -36 1724 p (infects.) s t-bol.300 @sf -36 1832 p (A.10.1) s 40 r (Load) s 15 r (object) s t-rom.300 @sf -36 1910 p (This) s 11 r (routine) s 12 r (opens) s 13 r 97 c 13 r 174 c (le,) s 14 r (determines) s 14 r (its) s 12 r (length,) s 13 r (allocating) s -36 1960 p (the) s 7 r (appropriate) s 8 r (amount) s 9 r (of) s 8 r (memory) s -2 r 44 c 10 r (reads) s 9 r (it) s 8 r (in) s 8 r (as) s 10 r (one) s 9 r (block,) s -36 2010 p (decodes) s 15 r (the) s 16 r (block) s 16 r (of) s 16 r (memory) s 16 r (\(with) s 15 r (XOR\).) s 16 r (If) s 16 r (the) s 16 r (object) s -36 2059 p (name) s 7 r (contains) s 7 r 97 c 9 r (comma,) s 9 r (it) s 7 r (moves) s 8 r (past) s 8 r (it) s 7 r (and) s 8 r (starts) s 7 r (the) s 8 r (name) s -36 2109 p (there.) s t-bol.300 @sf -36 2218 p (A.10.2) s 40 r (Get) s 16 r (object) s 17 r (by) s 15 r (name) s t-rom.300 @sf -36 2295 p (This) s 5 r (routine) s 6 r (returns) s 7 r 97 c 7 r (pointer) s 6 r (to) s 6 r (the) s 7 r (requested) s 7 r (object.) s 13 r (This) s 7 r (is) s -36 2345 p (used) s 9 r (to) s 9 r 174 c (nd) s 9 r (the) s 10 r (pieces) s 11 r (to) s 9 r (download) s 9 r (when) s 9 r (infecting) s 9 r (another) s -36 2395 p (host.) s t-bol.360 @sf -36 2512 p (A.1) s -2 r 49 c 48 r (Other) s 18 r (initialization) s 17 r 114 c (outines) s t-bol.300 @sf -36 2590 p (A.1) s -2 r (1.1) s 40 r (if) s 15 r (init) s t-rom.300 @sf -36 2667 p (This) s 11 r (routine) s 11 r (scans) s 14 r (the) s 13 r (array) s 13 r (of) s 12 r (network) s 12 r (interfaces.) s 21 r (It) s 13 r (gets) s -36 2717 p (the) s 13 r 175 c (ags) s 15 r (for) s 15 r (each) s 15 r (interface,) s 17 r (and) s 15 r (makes) s 16 r (sure) s 15 r (the) s 14 r (interface) s 1012 96 p (is) s 11 r (UP) s 10 r (and) s 11 r (RUNNING) s 10 r (\(speci) s 174 c 99 c 11 r 174 c (elds) s 11 r (of) s 10 r (the) s 10 r 175 c (ag) s 11 r (structure\).) s 1012 146 p (If) s 15 r (the) s 15 r (entry) s 15 r (is) s 15 r 97 c 16 r (point) s 13 r (to) s 15 r (point) s 13 r (type) s 15 r (interface,) s 17 r (the) s 15 r (remote) s 1012 196 p (address) s 11 r (is) s 10 r (saved) s 11 r (and) s 10 r (added) s 10 r (to) s 9 r (the) s 10 r (host) s 10 r (table.) s 13 r (It) s 10 r (then) s 10 r (tries) s 9 r (to) s 1012 246 p (enter) s 11 r (the) s 10 r (router) s 9 r (into) s 9 r (the) s 11 r (list) s 9 r (of) s 10 r (hosts) s 9 r (to) s 10 r (attack.) s t-bol.300 @sf 1012 370 p (A.1) s -1 r (1.2) s 41 r (rt) s 16 r (init) s t-rom.300 @sf 1012 452 p (This) s 10 r (routine) s 7 r (runs) s c-med.300 @sf 9 r (netstat) s 24 r (-r) s 25 r (-n) s t-rom.300 @sf 9 r (as) s 10 r 97 c 10 r (subprocess.) s 14 r (This) s 1012 502 p (shows) s 15 r (the) s 14 r (routing) s 12 r (table,) s 15 r (with) s 14 r (the) s 14 r (addresses) s 15 r (listed) s 14 r (numer-) s 1012 552 p (ically) s -2 r 46 c 19 r (It) s 12 r (gives) s 12 r (up) s 12 r (after) s 12 r 174 c (nding) s 11 r (500) s 12 r (gateways.) s 20 r (It) s 12 r (skips) s 12 r (the) s 1012 602 p (default) s 8 r (route,) s 8 r (as) s 9 r (well) s 7 r (as) s 9 r (the) s 8 r (loopback) s 7 r (entry) s -2 r 46 c 12 r (It) s 8 r (checks) s 9 r (for) s 7 r (re-) s 1012 651 p (dundant) s 9 r (entries,) s 11 r (and) s 10 r (checks) s 11 r (to) s 10 r (see) s 11 r (if) s 9 r (this) s 10 r (address) s 10 r (is) s 10 r (already) s 1012 701 p (an) s 9 r (interface) s 9 r (address.) s 14 r (If) s 9 r (not,) s 8 r (it) s 8 r (adds) s 9 r (it) s 7 r (to) s 8 r (the) s 9 r (list) s 7 r (of) s 9 r (gateways.) s 1054 753 p (After) s 8 r (the) s 8 r (gateway) s 9 r (list) s 7 r (is) s 8 r (collected,) s 9 r (it) s 8 r (shuf) s 175 c (es) s 7 r (it) s 8 r (and) s 8 r (enters) s 1012 803 p (the) s 11 r (addresses) s 11 r (in) s 10 r (the) s 10 r (host) s 9 r (table.) s t-bol.360 @sf 1012 936 p (A.12) s 51 r (Interlock) s 18 r 114 c (outines) s t-rom.300 @sf 1012 1018 p (The) s 10 r (two) s 9 r (routines) s t-ita.300 @sf 8 r (checkother) s t-rom.300 @sf 11 r (and) s t-ita.300 @sf 9 r (othersleep) s t-rom.300 @sf 10 r (are) s 10 r (at) s 9 r (the) s 9 r (heart) s 1012 1068 p (of) s 9 r (the) s 9 r (excessive) s 11 r (propagation) s 8 r (of) s 8 r (the) s 10 r (virus.) s 12 r (It) s 9 r (is) s 9 r (clear) s 10 r (that) s 9 r (the) s 1012 1118 p (author) s 12 r (intended) s 12 r (for) s 12 r (the) s 12 r (virus) s 12 r (to) s 12 r (detect) s 13 r (that) s 12 r 97 c 13 r (machine) s 13 r (was) s 1012 1168 p (already) s 13 r (infected,) s 14 r (and) s 13 r (if) s 12 r (so) s 12 r (to) s 13 r (skip) s 12 r (it.) s 20 r (The) s 13 r (code) s 14 r (is) s 12 r (actually) s 1012 1217 p (fraught) s 13 r (with) s 13 r (timing) s 13 r 175 c (aws) s 14 r (and) s 14 r (design) s 14 r (errors) s 14 r (which) s 13 r (lead) s 14 r (it) s 1012 1267 p (to) s 10 r (permit) s 10 r (multipl) s -1 r 101 c 9 r (infections,) s 9 r (probably) s 9 r (more) s 11 r (often) s 9 r (than) s 10 r (the) s 1012 1317 p (designer) s 10 r (intended) s cmr7.300 @sf 1307 1303 p (12) s t-rom.300 @sf 1342 1317 p 46 c 1054 1369 p (An) s 14 r (active) s 14 r (infection) s 13 r (uses) s 14 r (the) s t-ita.300 @sf 14 r (othersleep) s t-rom.300 @sf 14 r (routine) s 13 r (for) s 13 r (two) s 1012 1419 p (purposes,) s 9 r 174 c (rst) s 8 r (to) s 8 r (sleep) s 9 r (so) s 8 r (that) s 8 r (it) s 7 r (doesn') s 116 c 7 r (use) s 9 r (much) s 8 r (processor) s 1012 1469 p (time,) s 17 r (and) s 15 r (second) s 15 r (to) s 15 r (listen) s 14 r (for) s 14 r (requests) s 16 r (from) s 14 r 96 c -2 r (`incoming') s -3 r 39 c 1012 1519 p (viruses.) s 13 r (The) s 9 r (virus) s 7 r (which) s 7 r (is) s 8 r (running) s t-ita.300 @sf 6 r (othersleep) s t-rom.300 @sf 8 r (is) s 8 r (referred) s 8 r (to) s 1012 1569 p (as) s 10 r (the) s 9 r 96 c -2 r (`listener) s 1 r 39 c -3 r 39 c 7 r (and) s 9 r (the) s 9 r (virus) s 9 r (which) s 8 r (is) s 9 r (running) s t-ita.300 @sf 7 r (checkother) s t-rom.300 @sf 1012 1618 p (is) s 11 r (referred) s 10 r (to) s 10 r (as) s 11 r (the) s 10 r 96 c -2 r (`tester) s 2 r 39 c -3 r ('.) s t-bol.300 @sf 1012 1742 p (A.12.1) s 42 r (Checkother) s t-rom.300 @sf 1012 1825 p (The) s 14 r (tester) s 14 r (tries) s 13 r (to) s 12 r (connect) s 14 r (to) s 12 r (port) s 13 r (23357) s 12 r (on) s 13 r (the) s 13 r (local) s 13 r (ma-) s 1012 1875 p (chine) s 9 r (\(using) s 7 r (the) s 8 r (loopback) s 7 r (address,) s 9 r (127.0.0.1\)) s 8 r (to) s 8 r (see) s 9 r (if) s 8 r (it) s 7 r (can) s 1012 1925 p (connect) s 11 r (to) s 11 r 97 c 11 r (listener) s -1 r 46 c 13 r (If) s 11 r (any) s 11 r (errors) s 10 r (occur) s 11 r (during) s 9 r (this) s 10 r (check,) s 1012 1974 p (the) s 9 r (virus) s 9 r (assumes) s 10 r (that) s 9 r (no) s 9 r (listener) s 8 r (is) s 9 r (present,) s 10 r (and) s 9 r (tries) s 9 r (to) s 8 r (be-) s 1012 2024 p (come) s 12 r 97 c 11 r (listener) s 9 r (itself.) s 1054 2077 p (If) s 8 r (the) s 7 r (connection) s 7 r (is) s 8 r (successful,) s 10 r (the) s 7 r (checker) s 9 r (sends) s 9 r 97 c 8 r (magic) s 1012 2126 p (number) s cmr7.300 @sf 1139 2112 p (13) s t-rom.300 @sf 1174 2126 p 44 c 14 r (and) s 12 r (listens) s 12 r (\(for) s 11 r (up) s 12 r (to) s 12 r (300) s 12 r (seconds\)) s 12 r (for) s 12 r 97 c 13 r (magic) s 1012 2176 p (number) s 11 r (from) s 10 r (the) s 10 r (listener) s cmr7.300 @sf 1425 2162 p (14) s t-rom.300 @sf 1460 2176 p 46 c 14 r (If) s 10 r (the) s 11 r (magic) s 11 r (number) s 10 r (is) s 10 r (wrong,) s 1012 2226 p (the) s 15 r (checker) s 15 r (assumes) s 16 r (it) s 14 r (is) s 14 r (being) s 14 r (spoofed) s 14 r (and) s 14 r (continues) s 14 r (to) s 1012 2276 p (run.) s 1054 2328 p (The) s 13 r (checker) s 13 r (then) s 11 r (picks) s 12 r 97 c 12 r (random) s 12 r (number) s -1 r 44 c 12 r (shifts) s 11 r (it) s 11 r (right) s 1012 2378 p (by) s 12 r (three) s 12 r (\(throwing) s 10 r (away) s 13 r (the) s 12 r (lower) s 12 r (three) s 12 r (bits\)) s 11 r (and) s 12 r (sends) s 12 r (it) s 1012 2428 p (to) s 15 r (the) s 15 r (listener) s -1 r 46 c 26 r (It) s 15 r (expects) s 15 r 97 c 16 r (number) s 15 r (back) s 15 r (within) s 14 r (ten) s 15 r (sec-) s 1012 2478 p (onds,) s 11 r (which) s 10 r (it) s 10 r (adds) s 10 r (to) s 10 r (the) s 10 r (one) s 11 r (sent.) s 15 r (If) s 10 r (this) s 9 r (sum) s 11 r (is) s 10 r (even,) s 12 r (the) s 1012 2520 p 390 2 ru cmr6.300 @sf 1040 2548 p (12) s t-rom.240 @sf 1072 2559 p (This) s 9 r (behavior) s 7 r (was) s 8 r (noted) s 8 r (by) s 8 r (both) s 8 r (looking) s 7 r (at) s 9 r (the) s 8 r (code) s 8 r (and) s 7 r (by) s 8 r (creating) s 1012 2598 p 97 c 11 r (testbed) s 9 r (setup,) s 10 r (manually) s 9 r (running) s 9 r 97 c 10 r (program) s 8 r (that) s 11 r (performs) s 9 r (the) s 10 r (checking) s 1012 2638 p (and) s 8 r (listening) s 7 r (functions.) s cmr6.300 @sf 1040 2666 p (13) s cmr8.300 @sf 1072 2677 p (874697) s cmr6.300 @sf 1180 2682 p (16) s cmmi8.300 @sf 1211 2677 p 59 c cmr8.300 @sf 5 r (8865431) s cmr6.300 @sf 1352 2682 p (10) s cmmi8.300 @sf 1382 2677 p 59 c cmr8.300 @sf 6 r (0416432) s -1 r (27) s cmr6.300 @sf 1559 2682 p 56 c 1040 2706 p (14) s cmr8.300 @sf 1072 2717 p (148898) s cmr6.300 @sf 1180 2722 p (16) s cmmi8.300 @sf 1211 2717 p 59 c cmr8.300 @sf 5 r (1345688) s cmr6.300 @sf 1352 2722 p (10) s cmmi8.300 @sf 1382 2717 p 59 c cmr8.300 @sf 6 r (0510423) s -1 r 48 c cmr6.300 @sf 1541 2722 p 56 c t-rom.300 @sf 954 2842 p (15) s @eop 16 @bop0 16 @bop1 t-rom.300 @sf -36 96 p (sender) s 11 r (increments) s c-med.300 @sf 12 r (pleasequit) s t-rom.300 @sf 44 c 12 r (which) s 11 r (\(as) s 12 r (noted) s 11 r (in) s 12 r (sec-) s -36 146 p (tio) s -1 r 110 c 8 r (A.3.2\)) s 11 r (does) s 10 r (very) s 11 r (littl) s -1 r (e.) s 4 196 p (Once) s 14 r (it) s 12 r (has) s 13 r 174 c (nished) s 12 r (communicating) s 12 r (\(or) s 13 r (failing) s 11 r (to) s 12 r (com-) s -36 246 p (municate\)) s 9 r (with) s 9 r (the) s 11 r (listener) s -1 r 44 c 9 r (the) s 10 r (checker) s 12 r (sleeps) s 11 r (for) s 10 r 174 c (ve) s 11 r (sec-) s -36 295 p (onds) s 7 r (and) s 10 r (tries) s 9 r (to) s 9 r (become) s 11 r 97 c 10 r (listener) s -2 r 46 c 12 r (It) s 9 r (creates) s 11 r 97 c 10 r (TCP) s 10 r (stream) s -36 345 p (socket,) s 11 r (sets) s 11 r (the) s 11 r (socket) s 12 r (options) s 9 r (to) s 11 r (indicate) s 11 r (that) s 10 r (it) s 11 r (should) s 10 r (al-) s -36 395 p (low) s 9 r (multiple) s 10 r (binds) s 10 r (to) s 10 r (that) s 11 r (address) s 12 r (\(in) s 10 r (case) s 13 r (the) s 11 r (listener) s t-ita.300 @sf 10 r (still) s t-rom.300 @sf -36 445 p (hasn') s 116 c 10 r (exited,) s 13 r (perhaps?\)) s 22 r (and) s 12 r (then) s 12 r (binds) s 12 r (the) s 13 r (socket) s 13 r (to) s 12 r (port) s -36 495 p (23357) s -1 r 44 c 11 r (and) s 12 r (listens) s 12 r (on) s 11 r (it) s 12 r (\(permitting) s 10 r 97 c 12 r (backlog) s 12 r (of) s 12 r (up) s 11 r (to) s 12 r (ten) s -36 544 p (pendin) s -1 r 103 c 9 r (connections.\)) s t-bol.300 @sf -36 652 p (A.12.2) s 40 r (Othersleep) s t-rom.300 @sf -36 730 p (The) s t-ita.300 @sf 14 r (othersleep) s t-rom.300 @sf 14 r (routine) s 13 r (is) s 14 r (run) s 14 r (when) s 14 r (the) s 15 r (main) s 14 r (body) s 14 r (of) s 14 r (the) s -36 779 p (viru) s -1 r 115 c 13 r (wants) s 13 r (to) s 14 r (idle) s 13 r (for) s 13 r 97 c 15 r (period) s 13 r (of) s 13 r (time.) s 25 r (This) s 14 r (was) s 14 r (appar-) s -36 829 p (ently) s 9 r (intended) s 11 r (to) s 12 r (help) s 11 r (the) s 12 r (virus) s 11 r 96 c -2 r (`hid) s -1 r (e') s -3 r 39 c 10 r (so) s 12 r (that) s 11 r (it) s 11 r (wouldn') s 116 c -36 879 p (use) s 12 r (enough) s 12 r (processor) s 13 r (time) s 13 r (to) s 12 r (be) s 13 r (noticed.) s 21 r (While) s 13 r (the) s 12 r (main) s -36 929 p (progr) s -1 r (am) s 9 r (sleeps,) s 11 r (the) s 10 r (listener) s 10 r (code) s 10 r (waits) s 10 r (to) s 10 r (see) s 11 r (if) s 10 r (any) s 10 r (check-) s -36 979 p (ers) s 7 r (have) s 8 r (appeared) s 8 r (and) s 8 r (queried) s 7 r (for) s 7 r (the) s 7 r (existence) s 8 r (of) s 7 r 97 c 9 r (listener) s -1 r 44 c -36 1028 p (as) s 9 r 97 c 11 r (simple) s 10 r 96 c -2 r (`background) s 8 r (task') s -2 r 39 c 9 r (of) s 10 r (the) s 10 r (main) s 11 r (virus.) s 4 1078 p (The) s 13 r (routine) s 12 r 174 c (rst) s 12 r (checks) s 14 r (to) s 12 r (see) s 13 r (if) s 13 r (it) s 11 r (has) s 13 r (been) s 14 r (set) s 12 r (up) s 13 r (as) s 13 r 97 c -36 1128 p (list) s -1 r (ener;) s 7 r (if) s 8 r (not,) s 9 r (it) s 7 r (calls) s 9 r (the) s 8 r (normal) s t-ita.300 @sf 9 r (sleep) s t-rom.300 @sf 8 r (function) s 7 r (to) s 8 r (sleep) s 9 r (for) s -36 1178 p (the) s 9 r (requested) s 10 r (number) s 10 r (of) s 10 r (seconds,) s 11 r (and) s 11 r (returns.) s 4 1228 p (If) s 11 r (it) s 10 r (is) s 11 r (set) s 11 r (up) s 11 r (as) s 12 r 97 c 11 r (listener) s -1 r 44 c 11 r (it) s 10 r (listens) s 10 r (on) s 11 r (the) s 11 r (checking) s 11 r (port) s -36 1278 p (with) s 8 r 97 c 11 r (timeout.) s 15 r (If) s 10 r (it) s 10 r (times) s 10 r (out,) s 11 r (it) s 10 r (returns,) s 10 r (otherwise) s 10 r (it) s 10 r (deals) s -36 1327 p (with) s 5 r (the) s 7 r (connection) s 7 r (and) s 8 r (subtracts) s 7 r (the) s 7 r (elapsed) s 8 r (real) s 8 r (time) s 8 r (from) s -36 1377 p (the) s 9 r (time) s 10 r (out) s 9 r (value.) s 4 1427 p (The) s 13 r (body) s 12 r (of) s 13 r (the) s 13 r (listener) s 12 r 96 c -2 r (`accepts') s -2 r 39 c 11 r (the) s 12 r (connection,) s 14 r (and) s -36 1477 p (sends) s 8 r 97 c 10 r (magic) s 10 r (number) s 10 r (to) s 9 r (the) s 9 r (checker) s -1 r 46 c 14 r (It) s 8 r (then) s 10 r (listens) s 8 r (\(for) s 9 r (up) s -36 1527 p (to) s 7 r (10) s 9 r (seconds\)) s 10 r (for) s 9 r (the) s 9 r (checker) s 2 r 39 c -1 r 115 c 9 r (magic) s 10 r (number) s -1 r 44 c 9 r (and) s 10 r (picks) s 9 r 97 c -36 1576 p (random) s 7 r (number) s -1 r 46 c 12 r (It) s 8 r (shifts) s 7 r (the) s 8 r (random) s 8 r (number) s 8 r (right) s 7 r (by) s 8 r (three,) s -36 1626 p (discarding) s 9 r (the) s 10 r (lower) s 11 r (bits,) s 11 r (and) s 11 r (sends) s 11 r (it) s 10 r (up) s 11 r (to) s 10 r (the) s 11 r (checker;) s 12 r (it) s -36 1676 p (then) s 13 r (listens) s 15 r (\(for) s 15 r (up) s 14 r (to) s 15 r (10) s 15 r (seconds\)) s 16 r (for) s 15 r 97 c 15 r (random) s 16 r (number) s -36 1726 p (from) s 9 r (the) s 11 r (checker) s -1 r 46 c 17 r (If) s 11 r (any) s 11 r (of) s 11 r (these) s 11 r (steps) s 11 r (fail,) s 11 r (the) s 11 r (connection) s -36 1776 p (is) s 9 r (closed) s 10 r (and) s 10 r (the) s 10 r (checker) s 12 r (is) s 10 r (ignored.) s 4 1825 p (Once) s 10 r (the) s 8 r (exchanges) s 10 r (have) s 10 r (occurred,) s 10 r (the) s 8 r (address) s 10 r (of) s 9 r (the) s 8 r (in-) s -36 1875 p (coming) s 7 r (connection) s 9 r (is) s 9 r (compared) s 10 r (with) s 8 r (the) s 9 r (loopback) s 9 r (address.) s -36 1925 p (If) s 7 r (it) s 6 r (is) s 7 r (not) s 7 r (from) s 7 r (the) s 7 r (loopback) s 7 r (address,) s 9 r (the) s 8 r (attempt) s 7 r (is) s 7 r (ignored.) s -36 1975 p (If) s 8 r (it) s 7 r (is,) s 10 r (then) s 8 r (if) s 9 r (the) s 9 r (sum) s 9 r (of) s 8 r (the) s 9 r (exchanged) s 10 r (random) s 9 r (numbers) s 9 r (is) s -36 2025 p (odd,) s 11 r (the) s 13 r (listener) s 11 r (increments) s c-med.300 @sf 13 r (pleasequit) s t-rom.300 @sf 12 r (\(with) s 11 r (littl) s -1 r 101 c 11 r (ef-) s -36 2075 p (fect,) s 10 r (as) s 12 r (noted) s 11 r (in) s 10 r (section) s 11 r (A.3.2\)) s 11 r (and) s 11 r (closes) s 12 r (the) s 10 r (listener) s 11 r (con-) s -36 2124 p (nection.) s t-bol.420 @sf -36 2261 p 66 c 56 r (Built) s 23 r (in) s 23 r (dictionary) s t-rom.300 @sf -36 2354 p (432) s 8 r (words) s 10 r (were) s 11 r (included:) s 134 2420 p (aaa) s 129 r (academia) s 133 r (aerobics) s 134 2470 p (airplane) s 49 r (albany) s 177 r (albatross) s 134 2519 p (albert) s 88 r (alex) s 219 r (alexander) s 134 2569 p (algebra) s 61 r (aliases) s 178 r (alphabet) s 134 2619 p (ama) s 115 r (amorphous) s 103 r (analog) s 134 2669 p (anchor) s 70 r (andromache) s 86 r (animals) s 134 2719 p (answer) s 66 r (anthropogenic) s 49 r (anvils) s 1171 89 p (anything) s 94 r (aria) s 180 r (ariadne) s 1171 139 p (arrow) s 144 r (arthur) s 142 r (athena) s 1171 189 p (atmosphere) s 50 r (aztecs) s 142 r (azure) s 1171 239 p (bacchus) s 108 r (bailey) s 140 r (banana) s 1171 289 p (bananas) s 108 r (bandit) s 137 r (banks) s 1171 339 p (barber) s 135 r (baritone) s 105 r (bass) s 1171 388 p (bassoon) s 107 r (batman) s 120 r (beater) s 1171 438 p (beauty) s 130 r (beethoven) s 71 r (beloved) s 1171 488 p (benz) s 163 r (beowulf) s 105 r (berkeley) s 1171 538 p (berliner) s 111 r (beryl) s 156 r (beverly) s 1171 588 p (bicameral) s 78 r (bob) s 179 r (brenda) s 1171 637 p (brian) s 155 r (bridget) s 123 r (broadway) s 1171 687 p (bumbling) s 80 r (bur) s (gess) s 115 r (campanile) s 1171 737 p (cantor) s 137 r (cardinal) s 108 r (carmen) s 1171 787 p (carolina) s 107 r (caroline) s 108 r (cascades) s 1171 837 p (castle) s 147 r (cat) s 194 r (cayuga) s 1171 886 p (celtics) s 135 r (cerulean) s 102 r (change) s 1171 936 p (charles) s 124 r (charming) s 85 r (charon) s 1171 986 p (chester) s 124 r (cigar) s 159 r (classic) s 1171 1036 p (clusters) s 114 r (cof) s (fee) s 139 r (coke) s 1171 1086 p (collins) s 129 r (commrades) s 52 r (computer) s 1171 1136 p (condo) s 139 r (cookie) s 131 r (cooper) s 1171 1185 p (cornelius) s 88 r (couscous) s 90 r (creation) s 1171 1235 p (creosote) s 103 r (cretin) s 147 r (daemon) s 1171 1285 p (dancer) s 131 r (daniel) s 140 r (danny) s 1171 1335 p (dave) s 163 r (december) s 82 r (defoe) s 1171 1385 p (deluge) s 130 r (desperate) s 86 r (develop) s 1171 1434 p (dieter) s 146 r (digital) s 134 r (discovery) s 1171 1484 p (disney) s 132 r (dog) s 179 r (drought) s 1171 1534 p (duncan) s 121 r (eager) s 153 r (easier) s 1171 1584 p (edges) s 147 r (edinbur) s (gh) s 72 r (edwin) s 1171 1634 p (edwina) s 121 r (egghead) s 104 r (eiderdown) s 1171 1683 p (eileen) s 142 r (einstein) s 112 r (elephant) s 1171 1733 p (elizabeth) s 91 r (ellen) s 161 r (emerald) s 1171 1783 p (engine) s 130 r (engineer) s 99 r (enterprise) s 1171 1833 p (enzyme) s 113 r (ersatz) s 146 r (establish) s 1171 1883 p (estate) s 147 r (euclid) s 140 r (evelyn) s 1171 1933 p (extension) s 81 r (fairway) s 115 r (felicia) s 1171 1982 p (fender) s 135 r (fermat) s 134 r 174 c (delity) s 1171 2032 p 174 c (nite) s 155 r 174 c (shers) s 134 r 175 c (akes) s 1171 2082 p 175 c (oat) s 167 r 175 c (ower) s 136 r 175 c (owers) s 1171 2132 p (foolproof) s 82 r (football) s 111 r (foresight) s 1171 2182 p (format) s 130 r (forsythe) s 105 r (fourier) s 1171 2231 p (fred) s 174 r (friend) s 142 r (frighten) s 1171 2281 p (fun) s 185 r (fungible) s 102 r (gabriel) s 1171 2331 p (gardner) s 114 r (gar) s 174 c (eld) s 115 r (gauss) s 1171 2381 p (geor) s (ge) s 128 r (gertrude) s 103 r (ginger) s 1171 2431 p (glacier) s 128 r (gnu) s 179 r (golfer) s 1171 2480 p (gor) s (geous) s 88 r (gor) s (ges) s 131 r (gosling) s 1171 2530 p (gouge) s 139 r (graham) s 118 r (gryphon) s 1171 2580 p (guest) s 153 r (guitar) s 144 r (gumption) s 1171 2630 p (guntis) s 138 r (hacker) s 132 r (hamlet) s 1171 2680 p (handily) s 115 r (happening) s 68 r (harmony) s 954 2842 p (16) s @eop 17 @bop0 17 @bop1 t-rom.300 @sf 106 89 p (harold) s 176 r (harvey) s 105 r (hebrides) s 106 139 p (heinlein) s 148 r (hello) s 134 r (help) s 106 189 p (herbert) s 165 r (hiawatha) s 68 r (hibernia) s 106 239 p (honey) s 181 r (horse) s 128 r (horus) s 106 289 p (hutchins) s 141 r (imbroglio) s 52 r (imperial) s 106 339 p (include) s 160 r (ingres) s 116 r (inna) s 106 388 p (innocuous) s 111 r (irishman) s 72 r (isis) s 106 438 p (japan) s 193 r (jessica) s 108 r (jester) s 106 488 p (jixian) s 187 r (johnny) s 101 r (joseph) s 106 538 p (joshua) s 174 r (judith) s 119 r (juggle) s 106 588 p (julia) s 208 r (kathleen) s 77 r (kermit) s 106 637 p (kernel) s 179 r (kirkland) s 78 r (knight) s 106 687 p (ladle) s 202 r (lambda) s 96 r (lamination) s 106 737 p (larkin) s 185 r (larry) s 139 r (lazarus) s 106 787 p (lebesgue) s 138 r (lee) s 170 r (leland) s 106 837 p (leroy) s 197 r (lewis) s 130 r (light) s 106 886 p (lisa) s 225 r (louis) s 136 r (lynne) s 106 936 p (macintosh) s 112 r (mack) s 129 r (maggot) s 106 986 p (magic) s 182 r (malcolm) s 73 r (mark) s 106 1036 p (markus) s 161 r (marty) s 121 r (marvin) s 106 1086 p (master) s 173 r (maurice) s 85 r (mellon) s 106 1136 p (merlin) s 174 r (mets) s 140 r (michael) s 106 1185 p (michelle) s 140 r (mike) s 135 r (minimum) s 106 1235 p (minsky) s 160 r (moguls) s 95 r (moose) s 106 1285 p (morley) s 165 r (mozart) s 103 r (nancy) s 106 1335 p (napoleon) s 130 r (nepenthe) s 68 r (ness) s 106 1385 p (network) s 146 r (newton) s 95 r (next) s 106 1434 p (noxious) s 150 r (nutriti) s -1 r (on) s 73 r (nyquist) s 106 1484 p (oceanography) s 50 r (ocelot) s 116 r (olivetti) s 106 1534 p (olivia) s 187 r (oracle) s 117 r (orca) s 106 1584 p (orwell) s 176 r (osiris) s 127 r (outlaw) s 106 1634 p (oxford) s 171 r (paci) s 174 c 99 c 108 r (painless) s 106 1683 p (pakistan) s 144 r (pam) s 147 r (papers) s 106 1733 p (password) s 126 r (patricia) s 93 r (penguin) s 106 1783 p (peoria) s 179 r (percolate) s 66 r (persimmon) s 106 1833 p (persona) s 154 r (pete) s 149 r (peter) s 106 1883 p (philip) s 184 r (phoenix) s 83 r (pierre) s 106 1933 p (pizza) s 196 r (plover) s 111 r (plymouth) s 106 1982 p (polynomial) s 92 r (pondering) s 48 r (pork) s 106 2032 p (poster) s 181 r (praise) s 119 r (precious) s 106 2082 p (prelude) s 158 r (prince) s 114 r (princeton) s 106 2132 p (protect) s 167 r (protozoa) s 72 r (pumpkin) s 106 2182 p (puneet) s 172 r (puppet) s 104 r (rabbit) s 106 2231 p (rachmaninof) s 102 c 59 r (rainbow) s 81 r (raindrop) s 106 2281 p (raleigh) s 167 r (random) s 91 r (rascal) s 106 2331 p (really) s 188 r (rebecca) s 93 r (remote) s 106 2381 p (rick) s 218 r (ripple) s 120 r (robotics) s 106 2431 p (rochester) s 131 r (rolex) s 132 r (romano) s 106 2480 p (ronald) s 176 r (rosebud) s 86 r (rosemary) s 106 2530 p (roses) s 198 r (ruben) s 123 r (rules) s 106 2580 p (ruth) s 215 r (sal) s 172 r (saxon) s 106 2630 p (scamper) s 146 r (scheme) s 95 r (scott) s 106 2680 p (scotty) s 183 r (secret) s 122 r (sensor) s 1159 89 p (serenity) s 81 r (sharks) s 162 r (sharon) s 1159 139 p (shef) s 174 c (eld) s 70 r (sheldon) s 138 r (shiva) s 1159 189 p (shivers) s 95 r (shuttle) s 156 r (signature) s 1159 239 p (simon) s 111 r (simple) s 157 r (singer) s 1159 289 p (single) s 113 r (smile) s 178 r (smiles) s 1159 339 p (smooch) s 84 r (smother) s 134 r (snatch) s 1159 388 p (snoopy) s 92 r (soap) s 192 r (socrates) s 1159 438 p (sossina) s 93 r (sparrows) s 118 r (spit) s 1159 488 p (spring) s 108 r (springer) s 131 r (squires) s 1159 538 p (strangle) s 81 r (stratford) s 126 r (stuttgart) s 1159 588 p (subway) s 86 r (success) s 145 r (summer) s 1159 637 p (super) s 123 r (superstage) s 93 r (support) s 1159 687 p (supported) s 48 r (surfer) s 171 r (suzanne) s 1159 737 p (swearer) s 85 r (symmetry) s 102 r (tangerine) s 1159 787 p (tape) s 144 r (tar) s (get) s 173 r (tarragon) s 1159 837 p (taylor) s 115 r (telephone) s 106 r (temptation) s 1159 886 p (thailand) s 78 r (tiger) s 191 r (toggle) s 1159 936 p (tomato) s 97 r (topography) s 77 r (tortoise) s 1159 986 p (toyota) s 108 r (trails) s 184 r (trivial) s 1159 1036 p (trombone) s 53 r (tubas) s 180 r (tuttle) s 1159 1086 p (umesh) s 105 r (unhappy) s 124 r (unicorn) s 1159 1136 p (unknown) s 57 r (urchin) s 161 r (utility) s 1159 1185 p (vasant) s 107 r (vertigo) s 149 r (vicky) s 1159 1235 p (village) s 99 r (vir) s (gini) s -1 r 97 c 138 r (warren) s 1159 1285 p (water) s 121 r (weenie) s 151 r (whatnot) s 1159 1335 p (whiting) s 84 r (whitney) s 133 r (will) s 1159 1385 p (william) s 85 r (williamsbur) s 103 c 47 r (willie) s 1159 1434 p (winston) s 80 r (wisconsin) s 101 r (wizard) s 1159 1484 p (wombat) s 79 r (woodwind) s 91 r (wormwood) s 1159 1534 p (yacov) s 114 r (yang) s 187 r (yellowstone) s 1159 1584 p (yosemite) s 63 r (zap) s 211 r (zimmerman) s t-bol.420 @sf 1012 1717 p (Refer) s (ences) s t-rom.300 @sf 1033 1812 p ([1]) s 20 r (R.) s 10 r (Hinden,) s 9 r (J.) s 10 r (Haverty) s -2 r 44 c 9 r (and) s 9 r (A.) s 10 r (Sheltzer) s -1 r 44 c 9 r 96 c -2 r (`The) s 9 r (DARP) s -3 r 65 c 1102 1862 p (Internet:) s 30 r (Interconnecting) s 17 r (Heterogeneous) s 19 r (Computer) s 1102 1912 p (Networks) s 16 r (with) s 16 r (Gateways,') s -2 r 39 c t-ita.300 @sf 18 r (IEEE) s 17 r (Computer) s 16 r (Maga-) s 1102 1962 p (zine) s t-rom.300 @sf 44 c 11 r (vol.) s 10 r (16,) s 10 r (num.) s 11 r (9,) s 10 r (pp.) s 10 r (38) s 177 c (48,) s 10 r (September) s 11 r (1983.) s 1033 2051 p ([2]) s 20 r (J.) s 14 r (S.) s 14 r (Quarterman) s 13 r (and) s 13 r (J.) s 13 r (C.) s 14 r (Hoskins,) s 13 r 96 c -2 r (`Notabl) s -1 r 101 c 12 r (Com-) s 1102 2101 p (puter) s 18 r (Networks,') s -2 r 39 c 18 r (in) s t-ita.300 @sf 17 r (Communicati) s -1 r (ons) s 16 r (of) s 17 r (the) s 17 r (ACM) s t-rom.300 @sf 44 c 1102 2151 p (vol.) s 10 r (29,) s 10 r (num.) s 11 r (10,) s 10 r (pp.) s 11 r (932) s 177 c (971,) s 9 r (October) s 10 r (1986.) s 1033 2240 p ([3]) s 20 r (S.) s 11 r (E.) s 10 r (Luria,) s 10 r (S.) s 11 r (J.) s 10 r (Gould,) s 9 r (and) s 10 r (S.) s 10 r (Singer) s -1 r 44 c t-ita.300 @sf 9 r 65 c 11 r 86 c -2 r (iew) s 8 r (of) s 9 r (Life) s t-rom.300 @sf 46 c 1102 2290 p (Menlo) s 16 r (Park,) s 19 r (California:) s 23 r (Benjamin/Cummings) s 15 r (Pub-) s 1102 2339 p (lishing) s 9 r (Company) s -2 r 44 c 9 r (Inc.,) s 11 r (1981.) s 1033 2429 p ([4]) s 20 r (J.) s 22 r 87 c -2 r (atson) s t-ita.300 @sf 19 r (et) s 21 r (al.) s t-rom.300 @sf 44 c t-ita.300 @sf 23 r (Molecular) s 20 r (Biology) s 20 r (of) s 20 r (the) s 20 r (Gene) s t-rom.300 @sf 46 c 1102 2478 p (Menlo) s 16 r (Park,) s 19 r (California:) s 23 r (Benjamin/Cummings) s 15 r (Pub-) s 1102 2528 p (lishing) s 9 r (Company) s -2 r 44 c 9 r (Inc.,) s 11 r (1987.) s 1033 2617 p ([5]) s 20 r (G.) s 11 r (G.) s 10 r (Simpson) s 9 r (and) s 10 r 87 c -3 r 46 c 10 r (S.) s 11 r (Beck,) s t-ita.300 @sf 10 r (Life:) s 13 r (An) s 10 r (Intr) s -1 r (oduction) s 1102 2667 p (to) s 13 r (Biology) s t-rom.300 @sf 46 c 27 r (New) s 14 r 89 c -3 r (ork,) s 13 r (New) s 14 r 89 c -3 r (ork:) s 18 r (Harcourt,) s 15 r (Brace) s 1102 2717 p (and) s 11 r 87 c -2 r (ard,) s 9 r (Inc.,) s 11 r (1965.) s 954 2842 p (17) s @eop 18 @bop0 18 @bop1 t-rom.300 @sf -16 96 p ([6]) s 19 r (L.) s 25 r (Castro) s t-ita.300 @sf 24 r (et) s 24 r (al.) s t-rom.300 @sf 44 c 28 r 96 c -2 r (`Post) s 22 r (Mortem) s 24 r (of) s 24 r 51 c 24 r (November) s 52 146 p (ARP) s -3 r (ANET/MILNET) s 25 r (Attack.') s -2 r 39 c 24 r (National) s 23 r (Computer) s 52 196 p (Security) s 10 r (Center) s -1 r 44 c 10 r (Ft.) s 10 r (Meade) s 12 r (MD,) s 10 r 56 c 10 r (November) s 11 r (1988.) s -16 276 p ([7]) s 19 r 80 c -4 r 46 c 10 r (J.) s 11 r (Denning,) s 10 r 96 c -2 r (`Comput) s -1 r (er) s 9 r 86 c -1 r (ir) s -1 r (uses,') s -2 r 39 c t-ita.300 @sf 8 r (American) s 11 r (Scien-) s 52 326 p (tist) s t-rom.300 @sf 44 c 10 r (vol.) s 10 r (766,) s 10 r (pp.) s 10 r (236) s 177 c (238,) s 9 r (May-June) s 10 r (1988.) s -16 406 p ([8]) s 19 r (D.) s 9 r (Seeley) s -2 r 44 c 9 r 96 c -2 r (`A) s 6 r 84 c -2 r (our) s 7 r (of) s 8 r (the) s 8 r 87 c -2 r (orm,') s -2 r 39 c 6 r (in) s t-ita.300 @sf 7 r (USENIX) s 8 r (Associ-) s 52 456 p (ation) s 10 r 87 c -1 r (i) s -1 r (nter) s 9 r (Confer) s -1 r (ence) s 11 r (1989) s 10 r (Pr) s -1 r (oceedings) s t-rom.300 @sf 44 c 11 r (pp.) s 10 r (287) s 177 c 52 506 p (304,) s 10 r (January) s 11 r (1989.) s -16 587 p ([9]) s 19 r (E.) s 18 r (H.) s 17 r (Spaf) s (ford,) s 17 r 96 c -2 r (`The) s 16 r (Internet) s 15 r 87 c -2 r (orm) s 16 r (Program:) s 26 r (An) s 52 636 p (Analysis,') s -2 r 39 c t-ita.300 @sf 9 r (ACM) s 10 r (SIGCOM) s t-rom.300 @sf 44 c 10 r (vol.) s 9 r (19,) s 11 r (January) s 10 r (1989.) s -36 717 p ([10]) s 18 r (K.) s 22 r (Harrenstien,) s 24 r 96 c -2 r (`NAME/FINGER) s 20 r (Protocol) s 20 r (Proto-) s 52 767 p (col,') s -2 r 39 c 8 r (Request) s 7 r (For) s 8 r (Comments) s 8 r (NIC/RFC) s 6 r (742,) s 8 r (Network) s 52 816 p 87 c -2 r (orking) s 8 r (Group,) s 10 r (USC) s 10 r (ISI,) s 10 r (Novemeber) s 11 r (1977.) s -35 897 p ([1) s -1 r (1]) s 18 r (J.) s 12 r (Markof) s (f,) s 10 r 96 c -2 r (`Computer) s 9 r (Snarl:) s 15 r 65 c 11 r (`Back) s 11 r (Door) s 2 r 39 c 10 r (Ajar,') s -2 r 39 c t-ita.300 @sf 52 947 p (New) s 11 r 89 c -3 r (ork) s 10 r 84 c -1 r (imes) s t-rom.300 @sf 44 c 9 r (p.) s 11 r (B10,) s 10 r 55 c 10 r (November) s 10 r (1988.) s -36 1027 p ([12]) s 18 r (J.) s 17 r (B.) s 16 r (Postel,) s 17 r 96 c -2 r (`Simpl) s -1 r 101 c 15 r (Mail) s 15 r 84 c (ransfer) s 15 r (Protocol,') s -2 r 39 c 15 r (Re-) s 52 1077 p (quest) s 13 r (For) s 12 r (Comments) s 12 r (NIC/RFC) s 11 r (821,) s 13 r (Network) s 11 r 87 c -2 r (ork-) s 52 1127 p (ing) s 10 r (Group,) s 10 r (USC) s 10 r (ISI,) s 10 r (August) s 10 r (1982.) s -36 1207 p ([13]) s 18 r (S.) s 16 r (Bellovin,) s 16 r 96 c -2 r (`The) s 14 r (worm) s 16 r (and) s 15 r (the) s 15 r (debug) s 15 r (option,') s -2 r 39 c 14 r (in) s t-ita.300 @sf 52 1257 p (Forum) s 13 r (on) s 13 r (Risks) s 14 r (to) s 12 r (the) s 13 r (Public) s 12 r (in) s 12 r (Computers) s 13 r (and) s 12 r (Re-) s 52 1307 p (lated) s 13 r (Systems) s t-rom.300 @sf 44 c 15 r (vol.) s 12 r (7,) s 15 r (num.) s 13 r (74,) s 14 r (ACM) s 13 r (Committee) s 13 r (on) s 52 1357 p (Computers) s 10 r (and) s 10 r (Public) s 10 r (Policy) s -2 r 44 c 9 r (10) s 10 r (November) s 10 r (1988.) s -36 1437 p ([14]) s 18 r (J.) s 8 r (Collyer) s -1 r 44 c 6 r 96 c -2 r (`Risks) s 6 r (of) s 7 r (unchecked) s 7 r (input) s 6 r (in) s 7 r 67 c 7 r (programs,') s -2 r 39 c 52 1487 p (in) s t-ita.300 @sf 8 r (Forum) s 9 r (on) s 8 r (Risks) s 9 r (to) s 8 r (the) s 8 r (Public) s 8 r (in) s 7 r (Computers) s 8 r (and) s 8 r (Re-) s 52 1537 p (lated) s 13 r (Systems) s t-rom.300 @sf 44 c 15 r (vol.) s 12 r (7,) s 15 r (num.) s 13 r (74,) s 14 r (ACM) s 13 r (Committee) s 13 r (on) s 52 1587 p (Computers) s 10 r (and) s 10 r (Public) s 10 r (Policy) s -2 r 44 c 9 r (10) s 10 r (November) s 10 r (1988.) s -36 1667 p ([15]) s 18 r (J.) s 9 r (Saltzer) s 9 r (and) s 8 r (M.) s 9 r (Schroeder) s -1 r 44 c 9 r 96 c -2 r (`The) s 8 r (Protection) s 7 r (of) s 8 r (Infor-) s 52 1717 p (mation) s 7 r (in) s 7 r (Computer) s 7 r (Systems,') s -2 r 39 c 7 r (in) s t-ita.300 @sf 7 r (Pr) s -1 r (oc.) s 8 r (IEEE) s t-rom.300 @sf 44 c 9 r (vol.) s 7 r (63,) s 52 1767 p (num.) s 11 r (9,) s 10 r (pp.) s 11 r (1278) s 177 c (1308,) s 8 r (IEEE,) s 12 r (September) s 11 r (1975.) s -36 1847 p ([16]) s 18 r (J.) s 10 r (Steiner) s -1 r 44 c 9 r (C.) s 10 r (Neuman,) s 10 r (and) s 10 r (J.) s 10 r (Schiller) s -1 r 44 c 8 r 96 c -2 r (`Kerberos:) s 12 r (An) s 52 1897 p (Authentication) s 10 r (Service) s 11 r (for) s 11 r (Open) s 12 r (Network) s 10 r (Systems,') s -2 r 39 c 52 1947 p (in) s t-ita.300 @sf 9 r (USENIX) s 10 r (Association) s 8 r 87 c -1 r (inter) s 8 r (Confer) s -1 r (ence) s 9 r (1988) s 9 r (Pr) s -1 r (o-) s 52 1997 p (ceedings) s t-rom.300 @sf 44 c 11 r (pp.) s 11 r (191) s 177 c (202,) s 9 r (February) s 10 r (1988.) s -36 2077 p ([17]) s 18 r (M.) s 16 r (R.) s 15 r (Horton,) s 16 r 96 c -2 r (`How) s 13 r (to) s 15 r (Read) s 15 r (the) s 15 r (Network) s 15 r (News,') s -2 r 39 c t-ita.300 @sf 52 2127 p (UNIX) s 11 r (User) s 2 r 39 c -4 r 115 c 9 r (Supplementary) s 9 r (Documents) s t-rom.300 @sf 44 c 11 r (April) s 9 r (1986.) s -36 2207 p ([18]) s 18 r 80 c -4 r 46 c 21 r (Mockapetris,) s 22 r 96 c -2 r (`Domain) s 19 r (Names) s 22 r 45 c 20 r (Concepts) s 20 r (And) s 52 2257 p (Facilities,') s -2 r 39 c 14 r (Request) s 14 r (For) s 13 r (Comments) s 14 r (NIC/RFC) s 13 r (1034,) s 52 2307 p (Network) s 10 r 87 c -2 r (orking) s 8 r (Group,) s 9 r (USC) s 11 r (ISI,) s 10 r (November) s 11 r (1987.) s -36 2387 p ([19]) s 18 r (J.) s 11 r (Mogul) s 9 r (and) s 10 r (J.) s 11 r (B.) s 10 r (Postel,) s 10 r 96 c -2 r (`Internet) s 8 r (Standard) s 9 r (Subnet-) s 52 2437 p (ting) s 16 r (Procedure,') s -2 r 39 c 17 r (Request) s 16 r (For) s 17 r (Comments) s 16 r (NIC/RFC) s 52 2487 p (950,) s 8 r (Network) s 6 r 87 c -2 r (orking) s 5 r (Group,) s 7 r (USC) s 7 r (ISI,) s 7 r (August) s 6 r (1985.) s -36 2568 p ([20]) s 18 r (G.) s 19 r (Spaf) s (ford,) s 20 r 96 c -2 r (`A) s 17 r (cure!!!!!,') s -2 r 39 c 19 r (in) s t-ita.300 @sf 18 r (Forum) s 19 r (on) s 18 r (Risks) s 19 r (to) s 52 2617 p (the) s 11 r (Public) s 10 r (in) s 10 r (Computers) s 10 r (and) s 10 r (Related) s 11 r (Systems) s t-rom.300 @sf 44 c 11 r (vol.) s 10 r (7,) s 52 2667 p (num.) s 12 r (70,) s 12 r (ACM) s 11 r (Committee) s 10 r (on) s 11 r (Computers) s 11 r (and) s 11 r (Public) s 52 2717 p (Policy) s -2 r 44 c 10 r 51 c 10 r (November) s 10 r (1988.) s 1012 96 p ([21]) s 20 r (R.) s 11 r 87 c -3 r 46 c 9 r (Baldwin,) s t-ita.300 @sf 10 r (Rule) s 10 r (Based) s 10 r (Analysis) s 10 r (of) s 9 r (Computer) s 9 r (Se-) s 1102 146 p (curity) s t-rom.300 @sf 46 c 16 r (PhD) s 10 r (thesis,) s 10 r (MIT) s 11 r (EE,) s 11 r (June) s 10 r (1987.) s 1012 229 p ([22]) s 20 r (G.) s 19 r (Spaf) s (ford,) s 20 r 96 c -2 r (`A) s 17 r (worm) s 18 r 96 c -2 r (`condom') s -3 r (',') s -3 r 39 c 19 r (in) s t-ita.300 @sf 17 r (Forum) s 19 r (on) s 1102 279 p (Risks) s 9 r (to) s 6 r (the) s 8 r (Public) s 7 r (in) s 7 r (Computers) s 6 r (and) s 7 r (Related) s 8 r (Systems) s t-rom.300 @sf 44 c 1102 329 p (vol.) s 11 r (7,) s 12 r (num.) s 12 r (70,) s 11 r (ACM) s 11 r (Committee) s 11 r (on) s 11 r (Computers) s 11 r (and) s 1102 378 p (Public) s 10 r (Policy) s -2 r 44 c 9 r 51 c 10 r (November) s 11 r (1988.) s 954 2842 p (18) s @eop @end