Sciweavers

1548 search results - page 13 / 310
» Estimating Software Vulnerabilities
Sort
View
87
Voted
ACMSE
2006
ACM
15 years 3 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.
SRDS
2010
IEEE
14 years 7 months ago
A Study on Latent Vulnerabilities
Abstract-Software code reuse has long been touted as a reliable and efficient software development paradigm. Whilst this practice has numerous benefits, it is inherently susceptibl...
Beng Heng Ng, Xin Hu, Atul Prakash
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 1 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
ACSAC
2000
IEEE
15 years 1 months ago
ITS4: A Static Vulnerability Scanner for C and C++ Code
We describe ITS4, a tool for statically scanning security-critical C source code for vulnerabilities. Compared to other approaches, our scanning technique stakes out a new middle ...
John Viega, J. T. Bloch, Y. Kohno, Gary McGraw
SEKE
2010
Springer
14 years 7 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li