The tale of the weather worm

How humans behave when faced with a disaster, natural or man-made, can be exploited automatically by news-aware malicious software. We introduce weather worms, worms that can automatically identify abnormal events and their location, and target computers at that physical location. Such worms could be used to take advantage of poorly-defended computers in a disaster zone, and could amplify the effects of a physical attack. Defenses against weather worms require examination of policy and presentation of information on the Internet.

[1]  Niels Provos,et al.  Search worms , 2006, WORM '06.

[2]  Zachary J. Mason CorMet: A Computational, Corpus-Based Conventional Metaphor Extraction System , 2004, CL.

[3]  Ayalvadi J. Ganesh,et al.  On the effectiveness of automatic patching , 2005, WORM '05.

[4]  Milind Tambe,et al.  Multiagent teamwork: analyzing the optimality and complexity of key theories and models , 2002, AAMAS '02.

[5]  Mun Choon Chan,et al.  Pervasive Random Beacon in the Internet for Covert Coordination , 2005, Information Hiding.

[6]  R. Flesch A new readability yardstick. , 1948, The Journal of applied psychology.

[7]  NCW研究会,et al.  Information operations , 2020, Routledge Handbook of International Cybersecurity.

[8]  Dan Wu,et al.  On assigning place names to geography related web pages , 2005, Proceedings of the 5th ACM/IEEE-CS Joint Conference on Digital Libraries (JCDL '05).

[9]  Robert K. Cunningham,et al.  A taxonomy of computer worms , 2003, WORM '03.

[10]  H. Kucera,et al.  Computational analysis of present-day American English , 1967 .

[11]  John Aycock,et al.  Inverse Geolocation: Worms with a Sense of Direction , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.

[12]  Dragomir R. Radev,et al.  Generating summaries of multiple news articles , 1995, SIGIR '95.

[13]  John Langford,et al.  CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.

[14]  Ron Sivan,et al.  Web-a-where: geotagging web content , 2004, SIGIR '04.

[15]  Christopher D. Manning,et al.  Introduction to Information Retrieval , 2010, J. Assoc. Inf. Sci. Technol..

[16]  K. Fox,et al.  Timing Is Everything , 2000, Neuron.

[17]  Sergey Brin,et al.  The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.

[18]  Wenfei Fan,et al.  Keys for XML , 2001, WWW '01.

[19]  James H. Martin,et al.  Speech and language processing: an introduction to natural language processing, computational linguistics, and speech recognition, 2nd Edition , 2000, Prentice Hall series in artificial intelligence.

[20]  Kevin S. McCurley,et al.  Geospatial mapping and navigation of the web , 2001, WWW '01.

[21]  Moni Naor,et al.  VERI CATION OF A HUMAN IN THE LOOP OR IDENTI CATION VIA THE TURING TEST , 1996 .

[22]  Vern Paxson,et al.  The top speed of flash worms , 2004, WORM '04.

[23]  Aviel D. Rubin,et al.  Defending against an Internet-based attack on the physical world , 2002, TOIT.

[24]  P. V. Oorschot,et al.  Internet Geolocation and Evasion , 2006 .

[25]  Vern Paxson,et al.  How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.