Sciweavers

207 search results - page 3 / 42
» Measuring Similarity for Security Vulnerabilities
Sort
View
CCS
2007
ACM
14 years 14 days ago
Toward measuring network security using attack graphs
In measuring the overall security of a network, a crucial issue is to correctly compose the measure of individual components. Incorrect compositions may lead to misleading results...
Lingyu Wang, Anoop Singhal, Sushil Jajodia
CCS
2008
ACM
13 years 8 months ago
Measuring network security using dynamic bayesian network
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics...
Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushi...
ISCA
2012
IEEE
242views Hardware» more  ISCA 2012»
11 years 8 months ago
Side-channel vulnerability factor: A metric for measuring information leakage
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. Howeve...
John Demme, Robert Martin, Adam Waksman, Simha Set...
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 8 days ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
HICSS
2012
IEEE
260views Biometrics» more  HICSS 2012»
12 years 1 months ago
Effort Estimates for Vulnerability Discovery Projects
Security vulnerabilities continue to be an issue in the software field and new severe vulnerabilities are discovered in software products each month. This paper analyzes estimates...
Teodor Sommestad, Hannes Holm, Mathias Ekstedt