메뉴 건너뛰기




Volumn , Issue , 2006, Pages 172-177

An analysis of the vulnerability discovery process in web browsers

Author keywords

Firefox; Internet explorer; Mozilla; Vulnerability; Web browser

Indexed keywords

INTERNET; RISK ASSESSMENT; SECURITY OF DATA; SOFTWARE TESTING;

EID: 38049138451     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (27)

References (24)
  • 1
    • 33745473819 scopus 로고    scopus 로고
    • Tech. rep, Open Web Application Security Project OWASP
    • A. Kumar, Phishing - a new age weapon. Tech. rep., Open Web Application Security Project (OWASP), 2005.
    • (2005) Phishing - a new age weapon
    • Kumar, A.1
  • 2
    • 13244277801 scopus 로고    scopus 로고
    • E. E. Schultz, Internet Explorer Security: is there any hope? Network Security, 2005, issue 1,1 (Jan. 2005), pp 6-10.
    • E. E. Schultz, Internet Explorer Security: is there any hope? Network Security, Vol. 2005, issue 1,1 (Jan. 2005), pp 6-10.
  • 5
    • 79251599734 scopus 로고    scopus 로고
    • Securing your web browser
    • Tech. rep, CERT Coordination Center
    • W. Dormann, and J. Rafail, Securing your web browser. Tech. rep., CERT Coordination Center, 2006.
    • (2006)
    • Dormann, W.1    Rafail, J.2
  • 6
    • 38049164890 scopus 로고    scopus 로고
    • B. Krebs, Real world impact of IE flaw, Brian Krebs on Computer Security, http://blog.washingtonpost.com /securityfix/2006/04/ real_world_impact_of_internet_1.html, Posted April 3, 2006.
    • B. Krebs, Real world impact of IE flaw, Brian Krebs on Computer Security, http://blog.washingtonpost.com /securityfix/2006/04/ real_world_impact_of_internet_1.html, Posted April 3, 2006.
  • 9
    • 26444448266 scopus 로고    scopus 로고
    • Security in open versus closed systems - the dance of Boltzmann, Coase and Moore
    • R. Anderson, Security in open versus closed systems - the dance of Boltzmann, Coase and Moore. In Conf. on Open Source Software: Economics, Law and Policy (2002), pp. 1-15.
    • (2002) Conf. on Open Source Software: Economics, Law and Policy , pp. 1-15
    • Anderson, R.1
  • 11
    • 27744556127 scopus 로고    scopus 로고
    • Quantitative Vulnerability Assessment of Systems Software
    • Alexandria, Virginia, U.S.A, January 23-27
    • O. H. Alhazmi and Y. K. Malaiya, "Quantitative Vulnerability Assessment of Systems Software," Proceedings of 51st Reliability and Maintainability Symposium, Alexandria, Virginia, U.S.A, January 23-27 2005 .pp. 615-621.
    • (2005) Proceedings of 51st Reliability and Maintainability Symposium , pp. 615-621
    • Alhazmi, O.H.1    Malaiya, Y.K.2
  • 14
    • 38049133634 scopus 로고    scopus 로고
    • National Vulnerability Database, April
    • National Vulnerability Database, http://nvd.nist.gov/, April 2006.
    • (2006)
  • 15
    • 38049097288 scopus 로고    scopus 로고
    • April
    • Net Applications, http://www.netapplications.com/, April 2006.
    • (2006) Net Applications
  • 16
    • 33947317857 scopus 로고    scopus 로고
    • October
    • SLOCCount,http://www.dwheeler.com/sloccount/,October2006
    • (2006) SLOCCount
  • 19
    • 38049122734 scopus 로고    scopus 로고
    • Vulnerability likelihood: A probabilistic approach to software assurance
    • CERIAS
    • R. Gopalakrishna, E. Spafford, and J. Vitek, Vulnerability likelihood: a probabilistic approach to software assurance. Tech rep., CERIAS, 2005
    • (2005) Tech rep
    • Gopalakrishna, R.1    Spafford, E.2    Vitek, J.3
  • 21
    • 38049143363 scopus 로고    scopus 로고
    • R. C. Seacord, and A. D. Householder, Structured approach to classifying vulnerabilities. Tech rep., CMU/SE1-2005-TN-003, Carnegie Mellon, 2005.
    • R. C. Seacord, and A. D. Householder, Structured approach to classifying vulnerabilities. Tech rep., CMU/SE1-2005-TN-003, Carnegie Mellon, 2005.
  • 22
    • 38049155211 scopus 로고    scopus 로고
    • E. E. Schultz, D. S. Brown, and T. Longstaff A. Responding to computer security incidents. Tech rep., Lawrence Livemore National Laboratory, July 1990.
    • E. E. Schultz, D. S. Brown, and T. Longstaff A. Responding to computer security incidents. Tech rep., Lawrence Livemore National Laboratory, July 1990.
  • 23
    • 38049164888 scopus 로고    scopus 로고
    • April
    • Secunia, http://secunia.com/, April 2006.
    • (2006) Secunia


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.