메뉴 건너뛰기




Volumn , Issue , 2000, Pages 156-165

Using model checking to analyze network vulnerabilities

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATA THEORY; CLIENT SERVER COMPUTER SYSTEMS; NETWORK PROTOCOLS; TELECOMMUNICATION SERVICES; WORLD WIDE WEB;

EID: 0033718255     PISSN: 10637109     EISSN: None     Source Type: Journal    
DOI: 10.1109/SECPRI.2000.848453     Document Type: Article
Times cited : (376)

References (15)
  • 1
    • 85177125908 scopus 로고    scopus 로고
    • Apache Web Server http://www.apache.com
  • 2
    • 85177111932 scopus 로고    scopus 로고
    • R. Baldwin Kuang: Rule-based security checking
    • Baldwin, R.1
  • 3
    • 0004097670 scopus 로고
    • Software Testing Techniques
    • 2nd Thomson Computer Press
    • B. Beizer Software Testing Techniques 2nd 1990 Thomson Computer Press
    • (1990)
    • Beizer, B.1
  • 4
    • 0001973006 scopus 로고
    • Symbolic Model Checking: 1020 States and Beyond
    • J. Birch E. Clarke K. McMillan D. Dill L. J. Hwang Symbolic Model Checking: 1020 States and Beyond Proceedings of the ACM/SIGDA International Workshop in Formal Methods in VLSI Design Proceedings of the ACM/SIGDA International Workshop in Formal Methods in VLSI Design 1991-January
    • (1991)
    • Birch, J.1    Clarke, E.2    McMillan, K.3    Dill, D.4    Hwang, L.J.5
  • 6
    • 0003962322 scopus 로고    scopus 로고
    • Model Checking
    • MIT Press MA, Cambridge
    • E. Clarke O. Grumberg D. Peled Model Checking 2000 MIT Press MA, Cambridge
    • (2000)
    • Clarke, E.1    Grumberg, O.2    Peled, D.3
  • 7
    • 85177125209 scopus 로고    scopus 로고
    • Computer Oracle and Password System (COPS)
  • 9
    • 85177133611 scopus 로고    scopus 로고
    • System Scanner Internet Security Systems http://www.iss.net
  • 10
    • 77958030380 scopus 로고    scopus 로고
    • Fang: A Firewall Analysis Engine
    • CA
    • A. Mayer A. Wool E. Ziskind Fang: A Firewall Analysis Engine Proceedings of the IEEE Symposium on Security and Privacy Proceedings of the IEEE Symposium on Security and Privacy Oakland CA 2000-May
    • (2000)
    • Mayer, A.1    Wool, A.2    Ziskind, E.3
  • 11
    • 0030705405 scopus 로고    scopus 로고
    • Automated analysis of cryptographic protocols using Murø
    • CA
    • J. C. Mitchell M. Mitchell U. Stern Automated analysis of cryptographic protocols using Murø Proceedings of the IEEE Symposium on Security and Privacy 141 151 Proceedings of the IEEE Symposium on Security and Privacy Oakland CA 1997-May
    • (1997) , pp. 141-151
    • Mitchell, J.C.1    Mitchell, M.2    Stern, U.3
  • 12
    • 85177135706 scopus 로고    scopus 로고
    • CyberCop Scanner Network Associates http://www.nai.com/asp_set/ products/tns/ccscanner_intro.asp
  • 13
    • 85177116861 scopus 로고    scopus 로고
    • RedHat Linux http://www.redhat.com
  • 14
    • 85177118134 scopus 로고    scopus 로고
    • SMV http:// www.cs.cmu.edu/~modelcheck
  • 15
    • 0002624585 scopus 로고    scopus 로고
    • NetKuang -A Multi-Host Configuration Vulnerability Checker
    • CA
    • D. Zerkle K. Levitt NetKuang-A Multi-Host Configuration Vulnerability Checker Proceedings of the Sixth USENIX Unix Security Symposium Proceedings of the Sixth USENIX Unix Security Symposium San Jose CA 1996
    • (1996)
    • Zerkle, D.1    Levitt, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.