<s>
A	O
Warhol	B-Application
worm	I-Application
is	O
a	O
computer	O
worm	O
that	O
spreads	O
as	O
fast	O
as	O
physically	O
possible	O
,	O
infecting	O
all	O
vulnerable	O
machines	O
on	O
the	O
entire	O
Internet	O
in	O
15	O
minutes	O
or	O
less	O
.	O
</s>
<s>
A	O
2002	O
paper	O
presented	O
at	O
the	O
11th	O
USENIX	B-Operating_System
Security	I-Operating_System
Symposium	I-Operating_System
proposed	O
designs	O
for	O
better	O
worms	O
,	O
such	O
as	O
a	O
"	O
flash	B-Application
worm	I-Application
"	O
that	O
identifies	O
a	O
hit-list	O
of	O
vulnerable	O
targets	O
before	O
attacking	O
.	O
</s>
<s>
In	O
2003	O
,	O
SQL	O
Slammer	O
became	O
the	O
first	O
observed	O
example	O
of	O
a	O
Warhol	B-Application
worm	I-Application
.	O
</s>
<s>
The	O
mechanism	O
of	O
SQL	O
Slammer	O
's	O
spread	O
used	O
a	O
pseudo-random	B-Algorithm
number	I-Algorithm
generator	I-Algorithm
seeded	O
from	O
a	O
system	O
variable	O
to	O
determine	O
which	O
IP	B-Protocol
addresses	I-Protocol
to	O
attack	O
next	O
for	O
a	O
rapid	O
,	O
unpredictable	O
spread	O
.	O
</s>
