نتایج جستجو برای: vulnerability analysis

تعداد نتایج: 2857032  

2016
Bhargava Shastry Fabian Yamaguchi Konrad Rieck Jean-Pierre Seifert

Eliminating vulnerabilities from low-level code is vital for securing software. Static analysis is a promising approach for discovering vulnerabilities since it can provide developers early feedback on the code they write. But, it presents multiple challenges not the least of which is understanding what makes a bug exploitable and conveying this information to the developer. In this paper, we p...

2007
Marco Cova Viktoria Felmetsger Giovanni Vigna

In the last few years, the popularity of web-based applications has grown tremendously. A number of factors have led an increasing number of organizations and individuals to rely on web-based applications to provide access to a variety of services. Today, web-based applications are routinely used in securitycritical environments, such as medical, financial, and military systems. Web-based syste...

2010
Erik Jenelius

Disruptions in the transport system can have severe impacts for affected individuals, businesses and the society as a whole. In this research, vulnerability is seen as the risk of unplanned system disruptions, with a focus on large, rare events. Vulnerability analysis aims to provide decision support regarding preventive and restorative actions, ideally as an integrated part of the planning pro...

2013
Linus Feiten Matthias Sauer Tobias Schubert Alexander Czutro Victor Tomashevich Eberhard Böhl Ilia Polian Bernd Becker

Vulnerability to malicious fault attacks is an emerging concern for hardware circuits that process sensitive data. We describe a new methodology to assess the vulnerability to such attacks, taking into account built-in protection mechanisms. Our method is based on accurate modeling of fault effects and their detection status expressed as Boolean satisfiability (SAT) formulae. Vulnerability is q...

2006
ÅKE J. HOLMGREN

Holmgren, Å. J. 2006.Quantitative vulnerability analysis of electric power networks. Division of Safety Research, Department of Transport and Economics, KTH, Stockholm ISBN 10: 91-85539-01-5. Disturbances in the supply of electric power can have serious implications for everyday life as well as for national (homeland) security. A power outage can be initiated by natural disasters, adverse weath...

Journal: :JNW 2009
Dong Wang Chen Liu

IP Multimedia Subsystem (IMS) as the core of Next Generation Network (NGN), its security is vital important. However, IMS is a network with openarchitecture based on IP, which brings a lot of security issues. There has already some research results about IMS security, but systematic and model-based research results are lacked. Based on TVRA method, this paper establishes a comprehensive vulnera...

2008
Abhishek Singh Baibhav Singh Hirosh Joseph

Give us 5 minutes and we will show you the best book to read today. This is it, the vulnerability analysis and defense for the internet that will be your best choice for better reading book. Your five times will not spend wasted by reading this website. You can take the book as a source to make better concept. Referring the books that can be situated with your needs is sometime difficult. But h...

2015
Tevfik Bultan

String manipulation errors in input validation and sanitization code are a common source for security vulnerabilities in web applications. This short survey summarizes the string analysis techniques we developed that can automatically identify and repair such vulnerabilities. Our approach (1) extracts clientand server-side input validation and sanitization functions, (2) models them as determin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید