메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 131-138

Large-scale vulnerability analysis

Author keywords

Business risk management; Disclosure date; Exploit; Intrusion detection; Patch; Security dynamics; Security exposure; Vulnerability lifecycle

Indexed keywords

COMPUTER PRIVACY; DISTRIBUTED COMPUTER SYSTEMS; LARGE SCALE SYSTEMS; RISK MANAGEMENT; SOFTWARE RELIABILITY;

EID: 34248370608     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1162666.1162671     Document Type: Conference Paper
Times cited : (173)

References (30)
  • 3
    • 33846152122 scopus 로고    scopus 로고
    • CERT, emergency response team coordination center
    • CERT, "Computer emergency response team coordination center," http://www.cert.org/.
    • Computer
  • 4
  • 8
    • 84925838576 scopus 로고    scopus 로고
    • R. Anderson, Why information security is hard-an economic perspective, In Proceedings of 17th Annual Computer Security Applications Conference (ACSAC), 2001.
    • R. Anderson, "Why information security is hard-an economic perspective," In Proceedings of 17th Annual Computer Security Applications Conference (ACSAC), 2001.
  • 11
    • 0034501876 scopus 로고    scopus 로고
    • Windows of vulnerability: A case study analysis
    • W. A. Arbaugh, W. L. Fithen, and J. McHugh, "Windows of vulnerability: A case study analysis," IEEE Computer, vol. 33, 2000.
    • (2000) IEEE Computer , vol.33
    • Arbaugh, W.A.1    Fithen, W.L.2    McHugh, J.3
  • 13
    • 34248332447 scopus 로고    scopus 로고
    • An empirical analysis of vendor response to disclosure policy
    • Tech. Rep, Carnegie Mellon University, March
    • Ashish Arora, Ramayya Krishnan, Rahul Telang, and Yubao Yang, "An empirical analysis of vendor response to disclosure policy," Tech. Rep., Carnegie Mellon University, March 2005.
    • (2005)
    • Arora, A.1    Krishnan, R.2    Telang, R.3    Yang, Y.4
  • 14
    • 34248343713 scopus 로고    scopus 로고
    • Empirical analysis of software vendors patching behavior, impact of vulnerability disclosure
    • Tech. Rep, Carnegie Mellon University, Jan
    • Ashish Arora, Ramayya Krishnan, Rahul Telang, and Yubao Yang, "Empirical analysis of software vendors patching behavior, impact of vulnerability disclosure," Tech. Rep., Carnegie Mellon University, Jan 2006.
    • (2006)
    • Arora, A.1    Krishnan, R.2    Telang, R.3    Yang, Y.4
  • 15
    • 34248365096 scopus 로고    scopus 로고
    • Laws of vulnerabilities
    • Qualys Research Report
    • Qualys Research Report, 2005, "Laws of vulnerabilities," http://www.qualys.com/docs/Laws-Report.pdf, 2005.
    • (2005)
  • 17
    • 34248341660 scopus 로고    scopus 로고
    • Hasan Cavusoglu, Huseyin Cavusoglu, and S. Raghunathan, Emerging issues in responsible vulnerability disclosure, in In the proceedings of WITS 2004, 2004.
    • Hasan Cavusoglu, Huseyin Cavusoglu, and S. Raghunathan, "Emerging issues in responsible vulnerability disclosure," in In the proceedings of WITS 2004, 2004.
  • 19
    • 34248399876 scopus 로고    scopus 로고
    • Full Disclosure, Full disclosure mailing list, http://lists.grok.org.uk/full-disclosure-charter.html.
    • Full Disclosure, "Full disclosure mailing list," http://lists.grok.org.uk/full-disclosure-charter.html.
  • 20
    • 19944429098 scopus 로고    scopus 로고
    • Bruce Schneier, The nonsecurity of secrecy, in Communications of the ACM v. 47, 2004, p. 120, ? 2004.
    • Bruce Schneier, "The nonsecurity of secrecy," in Communications of the ACM v. 47, 2004, p. 120, ? 2004.
  • 23
    • 34248361410 scopus 로고    scopus 로고
    • NGS
    • NGS, "Ngs software," http://www.ngssoftware.com/advisory.htm.
    • Ngs software
  • 24
    • 27544447936 scopus 로고    scopus 로고
    • eeye digital security
    • eEye, "eeye digital security," http://www.eeye.com/html/ research/advisories/index.html.
    • eEye1
  • 25
    • 34248386022 scopus 로고    scopus 로고
    • idefense
    • iDefense, "idefense," http://www.idefense.com/intelligence/ vulnerabilities/.
    • iDefense1
  • 26
    • 34248360211 scopus 로고    scopus 로고
    • milw0rm, Milw0rm exploit archive, http://www.milw0rm.com.
    • milw0rm, "Milw0rm exploit archive," http://www.milw0rm.com.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.