Bell Labs, Lucent Technologies
We will examine the details of a number of different attacks on the Internet.
The old attacks still work, and the new ones exploit holes that have
anticipated for some time. After examining an attack, we will see how it can be
The presentation will be fairly technical, stopping just short of most of the specific bits.
Bill Cheswick logged into his first computer in 1969. Six years later, he was graduated
from Lehigh University with a degree that looked like Computer Science.
Cheswick has worked on (and against) operating system security for over 25 years. He contracted for several years at Lehigh and the Naval Air Development Center working on systems programming and communications. In 1978 he worked at the American Newspaper Publishers Association/Research Institute, where he shared a patent for a hardware-based spelling checker, a device clearly after its time.
For the next nine years he worked for Systems and Computer Technology Corporation at a variety of universities including Temple University, LaSalle College, Harvard Business School, Manhattan College, NJIT, and several others. Duties included system management, consulting, software development, communications design and installation, PC evaluations, etc.
In 1987 (Morris minus 1) he joined Bell Laboratories as a Member of the Technical Staff. Since then he has worked on network security, PC viruses, mailers, the Plan9 operating system, and kernel hacking. He co-authored the first full book on Internet security in 1994, and has since toured the world giving media interviews and entertaining post-lunch security talks. Cliff Stoll, who is given to overstatement, has called Ches ``one of the seven avatars of the Internet.''
Ches continues to work and play at Bell Labs. He latest work includes various Internet munitions, a new edition of his book, and various mapping explorations of the Internet.
Peppermint oil is his favorite insecticide.