Check out the new USENIX Web site. next up previous
Up: Surviving Internet Catastrophes Previous: Acknowledgements

Bibliography

1
E. G. Barrantes et al.
Randomized instruction set emulation to disrupt binary code injection attacks.
In Proceedings of the 10th ACM CCS, pages 281-289, Washington D.C., USA, Oct. 2003.

2
C. Batten, K. Barr, A. Saraf, and S. Treptin.
pStore: A secure peer-to-peer backup system.
Technical Report MIT-LCS-TM-632, MIT, Dec. 2001.

3
A. R. Butt, T. A. Johnson, Y. Zheng, and Y. C. Hu.
Kosha: A peer-to-peer enhancement for the network file system.
In Proc. of ACM/IEEE Supercomputing, Pittsburgh, PA, Nov 2004.

4
M. Castro and B. Liskov.
Practical Byzantine fault tolerance.
In Proc. of the 3rd ACM/USENIX OSDI, pages 173-186, New Orleans, LA, Feb. 1999.

5
Y. Chen.
A prototype implementation of archival intermemory.
In Proceedings of the Fourth ACM International Conference on Digital Libraries, pages 28-37, Berkeley, CA, Aug. 1999.

6
Codegreen.
https://www.winnetmag.com/Article/ArticleID/22381/22381.html.

7
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton.
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks.
In Proceedings of the 7th USENIX Security Conference, pages 63-78, San Antonio, Texas, Jan. 1998.

8
L. P. Cox and B. D. Noble.
Pastiche: Making backup cheap and easy.
In Proc. of the 5th ACM/USENIX OSDI, pages 285-298, Boston, MA, Dec. 2002.

9
CRclean.
https://www.winnetmag.com/Article/ArticleID/22381/22381.html.

10
H. A. Kim and B. Karp.
Autograph: Toward automated, distributed worm signature detection.
In Proc. of the 13th USENIX Security Symposium, pages 271-286, Aug. 2004.

11
A. Haeberlen, A. Mislove, and P. Druschel.
Glacier: Highly durable, decentralized storage despite massive correlated failures.
In Proc. of NSDI, May 2005.

12
Insecure.org.
The nmap tool.
https://www.insecure.org/nmap.

13
F. Junqueira, R. Bhagwan, A. Hevia, K. Marzullo, and G. M. Voelker.
Coping with internet catastrophes.
Technical Report CS2005-0816, UCSD, Feb 2005.

14
F. Junqueira, R. Bhagwan, K. Marzullo, S. Savage, and G. M. Voelker.
The Phoenix Recovery System: Rebuilding from the ashes of an Internet catastrophe.
In Proc. of HotOS-IX, pages 73-78, Lihue, HI, May 2003.

15
F. Junqueira and K. Marzullo.
Synchronous Consensus for dependent process failures.
In Proc. of ICDCS, pages 274-283, Providence, RI, May 2003.

16
J. O. Kephart and W. C. Arnold.
Automatic extraction of computer virus signatures.
In Proceedings of the 4th Virus Bulletin International Conference, pages 178-184, Abingdon, England, 1994.

17
C. Kreibich and J. Crowcroft.
Honeycomb - Creating intrusion detection signatures using honeypots.
In Proc. of HotNets-II, pages 51-56, Cambridge, MA, Nov. 2003.

18
J. Kubiatowicz, D. Bindel, Y. Chen, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao.
Oceanstore: An architecture for global-scale persistent storage.
In Proc. of ACM ASPLOS, pages 190-201, Cambridge, MA, 2000.

19
J. Levin, R. LaBella, H. Owen, D. Contis, and B. Culver.
The use of honeynets to detect exploited systems across large enterprise networks.
In Proc. of the IEEE Information Assurance Workshop, pages 92-99, Atlanta, GA, June 2003.

20
M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard.
A cooperative Internet backup scheme.
In Proc. of USENIX Annual Technical Conference, pages 29-42, San Antonio, TX, 2003.

21
T. Liston.
Welcome To My Tarpit: The Tactical and Strategic Use of LaBrea.
Technical report, 2001.
https://www.threenorth.com/LaBrea/LaBrea.txt.

22
J. W. Lockwood, J. Moscola, M. Kulig, D. Reddick, and T. Brooks.
Internet worm and virus protection in dynamically reconfigurable hardware.
In Proc. of MAPLD, Sept. 2003.

23
D. Malkhi and M. Reiter.
Byzantine quorum systems.
In Proc. of ACM STOC, pages 569-578, El Paso, TX, 1997.

24
Microsoft Corporation.
Microsoft windows update.
https://windowsupdate.microsoft.com.

25
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver.
Inside the Slammer worm.
IEEE Privacy & Security, 1(4):33-39, Jul 2003.

26
D. Moore and C. Shannon.
The spread of the Witty worm.
https://www.caida.org/analysis/security/sitty/.

27
D. Moore, C. Shannon, and J. Brown.
Code Red: A case study on the spread and victims of an Internet worm.
In Proc. of ACM IMW, pages 273-284, Marseille, France, Nov. 2002.

28
D. Moore, C. Shannon, G. M. Voelker, and S. Savage.
Internet quarantine: Requirements for containing self-propagating code.
In Proc. of IEEE Infocom, pages 1901-1910, San Francisco, CA, Apr. 2003.

29
D. Moore, G. M. Voelker, and S. Savage.
Inferring Internet denial of service activity.
In Proc. of the USENIX Security Symposium, Washington, D.C., Aug. 2001.

30
Lurhq. mydoom word advisory.
https://www.lurhq.com/mydoomadvisory.html.

31
A. Rodriguez, C. Killian, S. Bhat, D. Kostic, and A. Vahdat.
Macedon: Methodology for automatically creating, evaluating, and designing overlay networks.
In Proc. of NSDI, pages 267-280, San Francisco, CA, Mar 2004.

32
A. I. T. Rowstron and P. Druschel.
Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems.
In Proc. of ACM Middleware, pages 329-350, Heidelberg, Germany, Nov. 2001.

33
S. Sidiroglou and A. D. Keromytis.
A network worm vaccine architecture.
In Proc. of IEEE Workshop on Enterprise Security, pages 220-225, Linz, Austria, June 2003.

34
S. Singh, C. Estan, G. Varghese, and S. Savage.
Automated Worm Fingerprinting.
In Proc. of the 6th ACM/USENIX OSDI, pages 45-60, San Francisco, CA, Dec. 2004.

35
Lurhq. sobig.a and the spam you received today.
https://www.lurhq.com/sobig.html.

36
Sophos anti-virus.
W32/sasser-a worm analysis.
https://www.sophos.com/virusinfo/analyses/w32sassera.html, May 2004.

37
S. Staniford.
Containment of Scanning Worms in Enterprise Networks.
Journal of Computer Security, 2004.

38
Symantec.
Symantec Security Response.
https://securityresponse.symantec.com/.

39
T. Toth and C. Kruegel.
Connection-history Based Anomaly Detection.
Technical Report TUV-1841-2002-34, Technical University of Vienna, June 2002.

40
J. Twycross and M. M. Williamson.
Implementing and testing a virus throttle.
In Proc. of the 12th USENIX Security Symposium, pages 285-294, Washington, D.C., Aug. 2003.

41
D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken.
A First step towards automated detection of buffer overrun vulnerabilities.
In Proc. of NDSS, pages 3-17, San Diego, CA, Feb. 2000.

42
H. J. Wang, C. Guo, D. R. Simon, and A. Zugenmaier.
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits.
In Proc. of ACM SIGCOMM, pages 193- 204, Portland, Oregon, Aug. 2004.

43
H. Weatherspoon, T. Moscovitz, and J. Kubiatowicz.
Introspective failure analysis: Avoiding correlated failures in peer-to-peer systems.
In Proc. of International Workshop on Reliable Peer-to-Peer Distributed Systems, Oct. 2002.

44
M. Williamson.
Throttling Viruses: Restricting propagation to defeat malicious mobile code.
Technical Report HPL-2002-172, HP Laboratories Bristol, June 2002.

45
C. Wong et al.
Dynamic quarantine of Internet worms.
In Proc. of DSN, pages 73-82, Florence, Italy, June 2004.

46
C. C. Zou, L. Gao, W. Gong, and D. Towsley.
Monitoring and early warning for Internet worms.
In Proceedings of the 10th ACM CCS, pages 190-199, Washington D.C., USA, Oct. 2003.



Flavio Junqueira 2005-02-17