The top speed of flash worms

  title={The top speed of flash worms},
  author={Stuart Staniford-Chen and David J Moore and Vern Paxson and Nicholas Weaver},
Flash worms follow a precomputed spread tree using prior knowledge of all systems vulnerable to the worm's exploit. In previous work we suggested that a flash worm could saturate one million vulnerable hosts on the Internet in under 30 seconds[18]. We grossly over-estimated. In this paper, we revisit the problem in the context of single packet UDP worms (inspired by Slammer and Witty). Simulating a flash version of Slammer, calibrated by current Internet latency measurements and observed worm… CONTINUE READING
Highly Cited
This paper has 216 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 139 extracted citations

217 Citations

Citations per Year
Semantic Scholar estimates that this publication has 217 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-4 of 4 references

Malicious Threats and Vulnerabilities in Instant Messaging

  • N. Hindocha, E. Chien
  • Technical report, Symantec,
  • 2003
Highly Influential
4 Excerpts

How to 0wn the Internet in Your Spare Time

  • S. Staniford, V. Paxson, N. Weaver
  • Proceedings of the 11th USENIX Security Symposium…
  • 2002
Highly Influential
5 Excerpts

Inside the Slammer Worm. IEEE Magazine of Security and Privacy

  • D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver
  • 2003
Highly Influential
4 Excerpts

Similar Papers

Loading similar papers…