메뉴 건너뛰기




Volumn , Issue , 2001, Pages 421-430

An experimental study of security vulnerabilities caused by errors

Author keywords

[No Author keywords available]

Indexed keywords

WEB SERVERS;

EID: 0035789487     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSN.2001.941426     Document Type: Conference Paper
Times cited : (31)

References (22)
  • 2
    • 0003914522 scopus 로고    scopus 로고
    • Technical Report CMU/SEI-99-TR-028, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, Jan.
    • J. Allen and A. Christie. State of the Practice of Intrusion Detection Technologies. Technical Report CMU/SEI-99-TR-028, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, Jan. 2000.
    • (2000) State of the Practice of Intrusion Detection Technologies
    • Allen, J.1    Christie, A.2
  • 7
    • 0031654007 scopus 로고    scopus 로고
    • An automated approach for identifying potential vulnerabilities in software
    • Oakland, CA, May
    • A. Ghosh, T. O'Connor, and G. McGraw. An Automated Approach for Identifying Potential Vulnerabilities in Software. In Proc. IEEE Symp. on Security and Privacy, pages 104-114, Oakland, CA, May 1998.
    • (1998) Proc. IEEE Symp. on Security and Privacy , pp. 104-114
    • Ghosh, A.1    O'Connor, T.2    McGraw, G.3
  • 9
    • 0022209689 scopus 로고
    • Effect of system workload on operating system reliability: A study on IBM 3081
    • Dec.
    • R. K. Iyer and D. Rossetti. Effect of System Workload on Operating System Reliability: A Study on IBM 3081. IEEE Trans. on Software Engineering, 11(12):1438-1448, Dec. 1985.
    • (1985) IEEE Trans. on Software Engineering , vol.11 , Issue.12 , pp. 1438-1448
    • Iyer, R.K.1    Rossetti, D.2
  • 11
    • 85093467807 scopus 로고    scopus 로고
    • Design principles for tamper-resistant smartcard processors
    • Chicago, IL, May
    • O. Kommerling and M. G. Kuhn. Design Principles for Tamper-Resistant Smartcard Processors. In Proc. USENIX Workshop on Smartcard Technology, pages 9-20, Chicago, IL, May 1999.
    • (1999) Proc. USENIX Workshop on Smartcard Technology , pp. 9-20
    • Kommerling, O.1    Kuhn, M.G.2
  • 12
    • 0023961238 scopus 로고
    • Concurrent error detection using watchdog processors - A survey
    • Feb.
    • A. Mahmood and E. McCluskey. Concurrent Error Detection Using Watchdog Processors - A Survey. IEEE Trans. on Computers, 37(2):160-174, Feb. 1988.
    • (1988) IEEE Trans. on Computers , vol.37 , Issue.2 , pp. 160-174
    • Mahmood, A.1    McCluskey, E.2
  • 15
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • Sept.
    • B. C. Neuman and T. Ts'o. Kerberos: An Authentication Service for Computer Networks. IEEE Communications, 32(9):33-38, Sept. 1994.
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Ts'o, T.2
  • 16
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • Oct.
    • R. Ortalo, Y. Deswarte, and M. Kaaniche. Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security. IEEE Trans. on Software Engineering, 25(5):633-650, Oct. 1999.
    • (1999) IEEE Trans. on Software Engineering , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaaniche, M.3
  • 17
    • 0003208906 scopus 로고
    • File Transfer Protocol (FTP)
    • Oct.
    • J. Postel and J. Reynolds. File Transfer Protocol (FTP). RFC 959, Oct. 1985.
    • (1985) RFC , vol.959
    • Postel, J.1    Reynolds, J.2
  • 18
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystem
    • Feb.
    • R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystem. Communications of the ACM, 21(2):120-126, Feb. 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.