skip to main content
10.1145/1920261.1920303acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

Back to Berferd

Published: 06 December 2010 Publication History

Abstract

It has been nearly twenty years since I published the Berferd paper. Much of it is quite outdated, reflecting the state of technology at the time. But it did touch a number of issues that have become quite important. I discuss some of the existing conditions around the time of the paper, and some of these issues.

References

[1]
the month of php security. http://php-security.org/index.html, 2010.
[2]
Steven M. Bellovin. There be dragons. In Proceedings of the Third Usenix Unix Security Symposium, pages 1--16, September 1992.
[3]
Steven M. Bellovin. Packets found on an internet. Computer Communications Review, 23(3):26--31, July 1993.
[4]
Bill Cheswick and Steve Bellovin. Firewalls et sécurité Internet. Addison-Wesley France, 1996.
[5]
Bill Cheswick, Hal Burch, and Steve Branigan. Mapping and visualizing the internet. In Usenix, 2000.
[6]
William R. Cheswick. The design of a secure internet gateway. In Proc. Summer USENIX Conference, Anaheim, CA, June 1990.
[7]
William R. Cheswick. An evening with Berferd, in which a cracker is lured, endured, and studied. In Proc. Winter USENIX Conference, pages 163--174, San Francisco, CA, January 1992.
[8]
William R. Cheswick and Steven M. Bellovin. Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley, Reading, MA, first edition. 1994.
[9]
William R. Cheswick, Steven M. Bellovin, and Aviel D. Rubin. Firewalls and Internet Security; Repelling the Wily Hacker. Addison-Wesley, Reading, MA, second edition, 2003.
[10]
F. Cohen. Computer viruses: theory and experiments. Comput. Secur., 6(1):22--35, 1987.
[11]
Fred Cohen. Depection toolkit, http://all.net/, 1998.
[12]
Dorothy E. Denning and Peter J. Denning. Internet Besieged. Addison Wesley Professional, 1997.
[13]
DoD trusted computer system evaluation criteria. DoD 5200.28-STD, DoD Computer Security Center, 1985.
[14]
Tom Duff. Experience with viruses on UNIX systems. j-COMP-SYS, 2(2):155--171, Spring 1989.
[15]
M. W. Eichin and J. A. Rochlis. With microscope and tweezers: An analysis of the Internet virus of november 1988. In Proc. IEEE Symposium on Research in Security and Privacy, pages 326--345, Oakland, CA, May 1989.
[16]
A. G. Fraser. Proc. icc. pages 20.1.1--20.1.3, June 1979.
[17]
George Friedman. The stuxnet computer worm and the iranian nuclear program---stratfor. http://www.stratfor.com/analysis/20100924_stuxnet_computer_worm_and_iranian_nuclear_program, 2010.
[18]
David Goldsmith and Michael Schiffman. Firewalking: A traceroute-like analysis of IP packet responses to determine gateway access control lists, 1998.
[19]
Stephen J. Gould. Wonderful Life: The Burgess Shale and the Nature of History. W. W. Norton and Company, 1990.
[20]
M. Handley, C. Kreibich, and V. Paxson. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. Proceedings of the USENIX Security Symposium, pages 115--131, 2001.
[21]
Paul A. Karger and Roger R. Schell. Multics security evaluation: Vulnerability analysis, Volume II. Technical Report ESD-TR-74-193, HQ Electronic Systems Division: Hanscom AFB, MA, June 1974.
[22]
Douglas Maughan. The need for a national cybersecurity research and development agenda. Commun. ACM, 53(2):29--31, 2010.
[23]
Peter G. Neumann, Matt Bishop, Sean Peisert, and Marv Schaefer. Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy. In Proceedings of the 31st IEEE Symposium on Security and Privacy, Oakland/Berkeley, CA, May 16--19, 2010.
[24]
David L. Presotto. Upas---a simpler approach to network mail. In USENIX Conference Proceedings, pages 533--538, Portland, OR, Summer 1985.
[25]
J. H. Saltzer, D. P. Reed, and D. D. Clark. End-to-end arguments in system design. ACM Trans. Comput. Syst., 2(4):277--288, 1984.
[26]
Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems, 1975.
[27]
Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson. Practical network support for ip traceback. pages 295--306, 2000.
[28]
Bruce Schneier. The stuxnet worm. http://www.schneier.com/blog/archives/2010/09/the_stuxnet_wor.html, 2010.
[29]
Cliff Stoll. Stalking the wily hacker. Communications of the ACM, 31(5):484, May 1988.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ACSAC '10: Proceedings of the 26th Annual Computer Security Applications Conference
December 2010
419 pages
ISBN:9781450301336
DOI:10.1145/1920261
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • ACSA: Applied Computing Security Assoc

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 December 2010

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

ACSAC '10
Sponsor:
  • ACSA

Acceptance Rates

Overall Acceptance Rate 104 of 497 submissions, 21%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 237
    Total Downloads
  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media