<--- Back to Details
First PageDocument Content
Computer worms / Computer network security / Cyberwarfare / SQL Slammer / Data security / Stefan Savage / Code Red / Firewall / Morris worm / Malware / System software / Denial-of-service attacks
Date: 2003-08-14 17:57:32
Computer worms
Computer network security
Cyberwarfare
SQL Slammer
Data security
Stefan Savage
Code Red
Firewall
Morris worm
Malware
System software
Denial-of-service attacks

Slammer Worm Dissection Inside the Slammer Worm

Add to Reading List

Source URL: cseweb.ucsd.edu

Download Document from Source Website

File Size: 414,62 KB

Share Document on Facebook

Similar Documents

Cryptocurrencies / Bitcoin / Concurrent computing / Computing / Computer network security / Multi-agent systems / Spamming / Cybercrime / Botnet / Mining pool / ZeroAccess botnet / Satoshi Nakamoto

Botcoin: Monetizing Stolen Cycles Danny Yuxing Huang, Hitesh Dharmdasani† , Sarah Meiklejohn Vacha Dave, Chris Grier∗ , Damon McCoy† , Stefan Savage, Nicholas Weaver∗ Alex C. Snoeren and Kirill Levchenko UC San D

DocID: 1xUSF - View Document

Cryptocurrencies / Bitcoin / Economy / Money / Financial technology / Alternative currencies / Digital currencies / Blockchains / Mt. Gox / Satoshi Nakamoto / Blockchain.info / BitPay

A Fistful of Bitcoins: Characterizing Payments Among Men with No Names Sarah Meiklejohn Marjori Pomarole Grant Jordan † Kirill Levchenko Damon McCoy Geoffrey M. Voelker Stefan Savage University of California, San Diego

DocID: 1xTuP - View Document

NSF Proposal TWC: Frontier: Collaborative: Beyond Technical Security: Developing an Empirical Basis for Socio-Economic Perspectives Stefan Savage, Geoffrey M. Voelker, James Fowler, Alex Snoeren,

DocID: 1uOj4 - View Document

Computing / Cyberwarfare / Security engineering / Computer security / Carnegie Mellon University / Denial-of-service attack / Denial-of-service attacks / Internet Relay Chat / Computer emergency response team / IPv6 / WHOIS / United States Computer Emergency Readiness Team

You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications Frank Li† Zakir Durumeric∗‡? Jakub Czyz∗ Mohammad Karami Michael Bailey‡ Damon McCoy. Stefan Savage◦ Vern Paxson†? of California

DocID: 1uG4k - View Document

Technology / Computing / Security engineering / Hacking / Computer network security / Wireless networking / On-board diagnostics / Global Positioning System / Bluetooth / Computer security / Wi-Fi / Electronic control unit

Comprehensive Experimental Analyses of Automotive Attack Surfaces Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, and Stefan Savage University of California, San Diego Karl Koscher, Alexei Cz

DocID: 1ucyB - View Document