DataMuseum.dk

Presents historical artifacts from the history of:

DKUUG/EUUG Conference tapes

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about DKUUG/EUUG Conference tapes

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download
Index: T a

⟦175c22141⟧ TextFile

    Length: 1376 (0x560)
    Types: TextFile
    Names: »abstract.latex«

Derivation

└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen
    └─⟦f36518b41⟧ »./worm/mit.tex.tar.z« 
        └─⟦87f8973c9⟧ 
            └─⟦this⟧ »abstract.latex« 

TextFile

%%%\begin{abstract}
%%% This needs to be min of 3in from top of page and lower than the right col
\vspace{.2in}
\begin{center}
{\bf Abstract}
\end{center}

In early November 1988 the Internet, a collection
of networks consisting of 60,000 host computers implementing the
TCP/IP protocol suite, was attacked by a virus, a program which broke
into computers on the network and which spread from one machine to
another.  This paper is a detailed analysis of the virus program\ifieee
.\else itself, as well as the reactions of the besieged Internet community.
We discuss the structure of the actual program, as well as the
strategies the virus used to reproduce itself. We present
the chronology of events as seen by our team at MIT, one of a handful
of groups around the country working to take apart the virus, in an
attempt to discover its secrets and to learn the network's
vulnerabilities.
\fi
We describe the lessons that this incident has taught the Internet
community and topics for future consideration and resolution.  A
detailed routine by routine description of the virus program
including the contents of its built in dictionary is provided.
%%\end{abstract}
%%%\vspace{2in}
%%%\noindent
%%%Copyright \copyright\ 1988 Massachusetts Institute of Technology \\
%%%A version of this paper will be presented at the 1989 IEEE Symposium on Research in Security and Privacy