[17461] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: analysis of the Witty worm

daemon@ATHENA.MIT.EDU (Steven M. Bellovin)
Mon Jun 13 14:57:29 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: "Steven M. Bellovin" <smb@cs.columbia.edu>
To: Jerrold Leichter <jerrold.leichter@smarts.com>
Cc: cryptography@metzdowd.com
In-Reply-To: Your message of "Fri, 10 Jun 2005 18:42:36 EDT."
             <Pine.SOL.4.61.0506101841300.8962@frame> 
Date: Fri, 10 Jun 2005 20:26:10 -0400

In message <Pine.SOL.4.61.0506101841300.8962@frame>, Jerrold Leichter writes:
>| | The paper itself (there's a link in the article) has several more items 
>| | of interest to this list.  Especially interesting is the effective 
>| | cryptanalysis of the PRNG used by the worm.  Implicit in many of the 
>| | analyses, though not a focus of the paper, is the amount of information 
>| | that the authors could gather about network configurations at different 
>| | sites: as we all know, traffic analysis is a powerful technique.
>| The links in the paper no longer work - they go to restricted pages.  The 
>| (or an) HTML version is in the Google cache at:
>| 
>| http://64.233.161.104/search?q=cache:oS94i-ojvIgJ:www.cc.gatech.edu/~akumar/
>witty.html+witty+worm+analysis+paxson&hl=en&start=1
>Oops.  I should have read it more closely first.  The only thing in Google's 
>cache is the intro page, with an abstract.  The paper (pdf and ps) and a slide
> 
>show are inaccessible, and are not in Google's cache.
>
>Anyone saved a copy?

It's on Vern's web page: 
http://www.icir.org/vern/papers/witty-draft.pdf or
http://www.icir.org/vern/papers/witty-draft.ps

		--Steven M. Bellovin, http://www.cs.columbia.edu/~smb



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post