Sciweavers

Share
6 search results - page 1 / 2
» Penetration Testing and Mitigation of Vulnerabilities Window...
Sort
View
IJNSEC
2016
39views more  IJNSEC 2016»
3 years 10 months ago
Penetration Testing and Mitigation of Vulnerabilities Windows Server
Cyber attack has become a major concern over the past few years. While the technical capability to attack has declined, hacking tools - both simple and comprehensive - are themsel...
Deris Stiawan, Mohd Yazid Idris, Abdul Hanan Abdul...
ACSAC
2007
IEEE
9 years 8 months ago
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting
We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a Dynamic Markov Model fitness heuristic. This heuristic allows us t...
Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cl...
CCS
2011
ACM
8 years 2 months ago
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities
The complexity of modern web applications makes it diļ¬ƒcult for developers to fully understand the security implications of their code. Attackers exploit the resulting security v...
Adam Doupé, Bryce Boe, Christopher Kruegel,...
CORR
2011
Springer
197views Education» more  CORR 2011»
8 years 6 months ago
Securing The Kernel via Static Binary Rewriting and Program Shepherding
Recent Microsoft security bulletins show that kernel vulnerabilities are becoming more and more important security threats. Despite the pretty extensive security mitigations many ...
Piotr Bania
DSN
2007
IEEE
9 years 8 months ago
Robustness Testing of the Windows DDK
Modern computers interact with many kinds of external devices, which have lead to a state where device drivers (DD) account for a substantial part of the operating system (OS) cod...
Manuel Mendonça, Nuno Neves
books