Sciweavers

18 search results - page 2 / 4
» Automated and Safe Vulnerability Assessment
Sort
View
ICSE
2007
IEEE-ACM
14 years 5 months ago
Stakeholder Value Driven Threat Modeling for Off the Shelf Based Systems
er abstract summarizes the Threat Modeling method based on Attacking Path Analysis (T-MAP) which quantifies and prioritizes security threats by calculating the total severity weig...
Yue Chen
DSN
2008
IEEE
13 years 12 months ago
Automatic security assessment of critical cyber-infrastructures
This research investigates the automation of security assessment of the static and dynamic properties of cyberinfrastructures, with emphasis on the electrical power grid. We descr...
Zahid Anwar, Ravinder Shankesi, Roy H. Campbell
ESSOS
2010
Springer
14 years 8 days ago
Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks
Completely handling SQL injection consists of two activities: properly protecting the system from malicious input, and preventing any resultant error messages caused by SQL injecti...
Ben H. Smith, Laurie Williams, Andrew Austin
ISSRE
2000
IEEE
13 years 9 months ago
Evaluation of Regressive Methods for Automated Generation of Test Trajectories
Automated generation of test cases is a prerequisite for fast testing. Whereas the research has addressed the creation of individual test points, test trajectoiy generation has at...
Brian J. Taylor, Bojan Cukic
IFIP
2007
Springer
13 years 11 months ago
Securing Current and Future Process Control Systems
Process control systems (PCSs) are instrumental to the safe, reliable and efficient operation of many critical infrastructure components. However, PCSs increasingly employ commodit...
Robert K. Cunningham, Steven Cheung, Martin W. Fon...