Check out the new USENIX Web site. next up previous
Next: Vulnerabilities Up: Wildfire worms Previous: Proof-of-concept implementation

Analysis

As with all worms, wildfire worms need to exploit a vulnerability to infect end-hosts. Unlike Internet worms that can effectively spread even if the vulnerable population is very small [48], wifi worms depend on the vulnerability being widespread. This raises two questions: what critical mass does a wildfire worm require to be effective, and whether there are indeed such pervasive vulnerabilities.



Subsections