[17459] in cryptography@c2.net mail archive
Re: analysis of the Witty worm
daemon@ATHENA.MIT.EDU (Jerrold Leichter)
Mon Jun 13 14:55:25 2005
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Fri, 10 Jun 2005 18:42:36 -0400 (EDT)
From: Jerrold Leichter <jerrold.leichter@smarts.com>
To: "Steven M. Bellovin" <smb@cs.columbia.edu>
Cc: cryptography@metzdowd.com
In-Reply-To: <Pine.SOL.4.61.0506101828290.8962@frame>
| | The paper itself (there's a link in the article) has several more items
| | of interest to this list. Especially interesting is the effective
| | cryptanalysis of the PRNG used by the worm. Implicit in many of the
| | analyses, though not a focus of the paper, is the amount of information
| | that the authors could gather about network configurations at different
| | sites: as we all know, traffic analysis is a powerful technique.
| The links in the paper no longer work - they go to restricted pages. The
| (or an) HTML version is in the Google cache at:
|
| http://64.233.161.104/search?q=cache:oS94i-ojvIgJ:www.cc.gatech.edu/~akumar/witty.html+witty+worm+analysis+paxson&hl=en&start=1
Oops. I should have read it more closely first. The only thing in Google's
cache is the intro page, with an abstract. The paper (pdf and ps) and a slide
show are inaccessible, and are not in Google's cache.
Anyone saved a copy?
-- Jerry
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com