Sciweavers

1101 search results - page 39 / 221
» On the Security and Vulnerability of PING
Sort
View
ACSAC
2007
IEEE
15 years 4 months ago
Automated Security Debugging Using Program Structural Constraints
Understanding security bugs in a vulnerable program is a non-trivial task, even if the target program is known to be vulnerable. Though there exist debugging tools that facilitate...
Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan...
ICSE
2007
IEEE-ACM
15 years 9 months ago
Stakeholder Value Driven Threat Modeling for Off the Shelf Based Systems
er abstract summarizes the Threat Modeling method based on Attacking Path Analysis (T-MAP) which quantifies and prioritizes security threats by calculating the total severity weig...
Yue Chen
ACSAC
2002
IEEE
15 years 2 months ago
Thirty Years Later: Lessons from the Multics Security Evaluation
Almost thirty years ago a vulnerability assessment of Multics identified significant vulnerabilities, despite the fact that Multics was more secure than other contemporary (and cu...
Paul A. Karger, Roger R. Schell
ACSAC
2002
IEEE
15 years 2 months ago
Representing TCP/IP Connectivity For Topological Analysis of Network Security
The individual vulnerabilities of hosts on a network can be combined by an attacker to gain access that would not be possible if the hosts were not interconnected. Currently avail...
Ronald W. Ritchey, Brian O'Berry, Steven Noel
TON
2008
86views more  TON 2008»
14 years 9 months ago
Securing user-controlled routing infrastructures
Designing infrastructures that give untrusted third parties (such as end-hosts) control over routing is a promising research direction for achieving flexible and efficient communic...
Karthik Lakshminarayanan, Daniel Adkins, Adrian Pe...