• David Salomon
Part of the Undergraduate Topics in Computer Science book series (UTICS)


A tapeworm is a parasite that lives inside the body of a bigger creature and sustains itself from its host’s resources. A software worm is a program that executes independently of other programs, replicates itself, and spreads through a network from computer to computer. A worm is a type of rogue software that resides in a host computer, but it is not a virus because it is not embedded in a host program. A worm propagates from host to host by exploiting a security hole or a vulnerability discovered by its creator. Section 3.4 shows how the Internet worm exploited security weaknesses in the finger and sendmail UNIX utilities. Section 2.11 describes a vulnerability in a decoder for jpeg images.


Worm Propagation Address Book Security Hole Internet Worm Infected Computer 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

  1. CDC (2004) is
  2. Code Red II (2001) “Code Red II: Another Worm Exploiting Buffer Overflow In IIS Indexing Service DLL,” CERT Incident Note IN-2001-09, Aug. 6. Available online at
  3. Cohen, Frederick B. (1994a) A Short Course on Computer Viruses, 2nd edition, New York, NY, John Wiley & Sons.MATHGoogle Scholar
  4. CVE (2001) is CVE-2001-0500, Buffer overflow in ISAPI extension, available online at
  5. IIS (2004) is
  6. IOCCC (2004) is
  7. OpenSSL (2004) is the OpenSSL project, located at
  8. Rochlis, J., and M. Eichin (1989) “With Microscope and Tweezers: The Worm from MIT’s Perspective,” Communications of the ACM, 32(6):689– 698, June.CrossRefGoogle Scholar
  9. Shoch, John and Jon Hupp (1982) “The Worm Programs—Early Experience With a Distributed Computation,” Communications of the ACM, 25(3)172– 180. Reprinted in [Denning 90].CrossRefGoogle Scholar
  10. Staniford, Stuart, Vern Paxson, and Nicholas Weaver (2002) “How to Own the Internet in Your Spare Time,” Proceedings of the 11th USENIX Security Symposium (Security ’02). Available online at
  11. Virus bulletin (2005) Virus Bulletin: The International Publication on Computer Virus Prevention, Recognition, and Removal. Available online at

Copyright information

© Springer London 2010

Authors and Affiliations

  1. 1.Computer Science Dept.California State University, NorthridgeNorthridgeUSA

Personalised recommendations