-
1
-
-
2342625318
-
More Bang for the Bug: An Account of 2003's Attack Trends
-
Jan.-Feb.
-
I. Arce, "More Bang for the Bug: An Account of 2003's Attack Trends," IEEE Sec. & Privacy, vol. 2, no. 1, Jan.-Feb. 2004, pp. 66-68.
-
(2004)
IEEE Sec. & Privacy
, vol.2
, Issue.1
, pp. 66-68
-
-
Arce, I.1
-
2
-
-
0028514027
-
A Taxonomy of Computer Program Security Flaws
-
Sept.
-
C. E. Landwehr et al., "A Taxonomy of Computer Program Security Flaws," ACM Comp. Surveys, vol. 26, no. 3, Sept. 1994, pp. 211-54.
-
(1994)
ACM Comp. Surveys
, vol.26
, Issue.3
, pp. 211-254
-
-
Landwehr, C.E.1
-
3
-
-
2442605789
-
-
ISI/SR-78-13, USC/Info. Sci. Inst., Marina Del Rey, CA, May
-
R. Bisbey II and D. Hollingworth, "Protection Analysis: Final Report," ISI/SR-78-13, USC/Info. Sci. Inst., Marina Del Rey, CA, May 1978.
-
(1978)
Protection Analysis: Final Report
-
-
Bisbey II, R.1
Hollingworth, D.2
-
4
-
-
2342512768
-
Susceptibility Matrix: A New Aid to Software Auditing
-
Mar-Apr
-
K. Jiwnani and M. Zelkowitz, "Susceptibility Matrix: A New Aid to Software Auditing," IEEE Sec. & Privacy, vol. 2, no. 2, Mar-Apr 2004, pp.16-21.
-
(2004)
IEEE Sec. & Privacy
, vol.2
, Issue.2
, pp. 16-21
-
-
Jiwnani, K.1
Zelkowitz, M.2
-
8
-
-
11144272176
-
A Taxonomy of DDoS Attack and DDoS Defense Mechanisms
-
Apr.
-
J. Mirkovic and P. Reiher, "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms," ACM SIGCOMM Comp. Commun. Rev., vol. 34, no. 2, Apr. 2004, pp. 39-53.
-
(2004)
ACM SIGCOMM Comp. Commun. Rev.
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
10
-
-
0242456149
-
Ontology in Information Security: A Useful Theoretical Foundation and Methodological Tool
-
V. Raskin et al., "Ontology in Information Security: A Useful Theoretical Foundation and Methodological Tool," Proc. New Sec. Paradigms Wksp., Cloudcroft, NM, 2001, pp. 53-59.
-
Proc. New Sec. Paradigms Wksp., Cloudcroft, NM, 2001
, pp. 53-59
-
-
Raskin, V.1
-
11
-
-
1942473600
-
An Historical Perspective of Software Vulnerability Management
-
Apr.
-
A. Gray, "An Historical Perspective of Software Vulnerability Management," Info. Sec. Tech. Rep., vol. 8, no. 4, Apr. 2003, pp. 34-44.
-
(2003)
Info. Sec. Tech. Rep.
, vol.8
, Issue.4
, pp. 34-44
-
-
Gray, A.1
-
16
-
-
0016873760
-
Penetrating an Operating System: A Study of VM/370 Integrity
-
C. Attanasio, P. Markenstein, and R. J. Phillips, "Penetrating an Operating System: a Study of VM/370 Integrity," IBM Sys. J., vol. 15, no. 1, 1976, pp. 102-16.
-
(1976)
IBM Sys. J.
, vol.15
, Issue.1
, pp. 102-116
-
-
Attanasio, C.1
Markenstein, P.2
Phillips, R.J.3
-
17
-
-
0021425586
-
Can Computer Crime Be Stopped?
-
May
-
T. S. Perry and P. Wallich, "Can Computer Crime Be Stopped?" IEEE Spectrum, vol. 21, no. 5, May 1984, pp. 34-45.
-
(1984)
IEEE Spectrum
, vol.21
, Issue.5
, pp. 34-45
-
-
Perry, T.S.1
Wallich, P.2
-
18
-
-
16344386685
-
What Is There to Worry About? An Introduction to the Computer Security Problem
-
IEEE Comp. Soc. Press
-
D. L. Brinkley and R. R. Schell, "What Is There to Worry About? An Introduction to the Computer Security Problem," Information Security: An Integrated Collection of Essays, pp. 11-39, IEEE Comp. Soc. Press, 1995.
-
(1995)
Information Security: An Integrated Collection of Essays
, pp. 11-39
-
-
Brinkley, D.L.1
Schell, R.R.2
-
19
-
-
0030701247
-
Information System Attacks: A Preliminary Classification Scheme
-
F. Cohen, "Information System Attacks: A Preliminary Classification Scheme," Comp. & Sec., vol. 16, no. 1, 1997, pp. 29-46.
-
(1997)
Comp. & Sec.
, vol.16
, Issue.1
, pp. 29-46
-
-
Cohen, F.1
-
20
-
-
0030674941
-
Information System Defenses: A Preliminary Classification Scheme
-
F. Cohen, "Information System Defenses: A Preliminary Classification Scheme," Comp. & Sec., vol. 16, no. 2, 1997, pp. 94-114.
-
(1997)
Comp. & Sec.
, vol.16
, Issue.2
, pp. 94-114
-
-
Cohen, F.1
-
21
-
-
0347229432
-
-
Tech. rep. SRI Project 2581, Contract DAAB03-73-C-1454, Prepared for USAECOM, Stanford Research Inst., 13 June
-
P. G. Neumann et al., "A Provably Secure Operating System," Tech. rep. SRI Project 2581, Contract DAAB03-73-C-1454, Prepared for USAECOM, Stanford Research Inst., 13 June, 1975.
-
(1975)
A Provably Secure Operating System
-
-
Neumann, P.G.1
-
22
-
-
0018047016
-
Computer System Security Evaluation
-
June
-
P. G. Neumann, "Computer System Security Evaluation," Proc. Nat'l. Comp. Conf., vol. 47, June 1978, pp. 1087-95.
-
(1978)
Proc. Nat'l. Comp. Conf.
, vol.47
, pp. 1087-1095
-
-
Neumann, P.G.1
-
25
-
-
15744370034
-
A Taxonomy of Network and Computer Attacks
-
Feb.
-
S. Hansman and R. Hunt, "A Taxonomy of Network and Computer Attacks," Comp. & Sec., vol. 24, no. 1, Feb. 2005, pp. 31-43.
-
(2005)
Comp. & Sec.
, vol.24
, Issue.1
, pp. 31-43
-
-
Hansman, S.1
Hunt, R.2
-
26
-
-
0032097883
-
A Map of Security Risks Associated with Using COTS
-
June
-
U. Lindquist and E. Jonsson, "A Map of Security Risks Associated with Using COTS," IEEE Computer, vol. 31 no. 6, June 1998, pp. 60-66.
-
(1998)
IEEE Computer
, vol.31
, Issue.6
, pp. 60-66
-
-
Lindquist, U.1
Jonsson, E.2
-
28
-
-
4544276923
-
A Defense-Centric Taxonomy Based on Attack Manifestations
-
K. S. Killourhy, R. A. Maxion, and K. M. C. Tan, "A Defense-Centric Taxonomy Based on Attack Manifestations," Proc. Int'l. Conf. Dependable Sys. and Networks, 28 June-1 July 2004, pp. 91-100.
-
Proc. Int'l. Conf. Dependable Sys. And Networks, 28 June-1 July 2004
, pp. 91-100
-
-
Killourhy, K.S.1
Maxion, R.A.2
Tan, K.M.C.3
-
29
-
-
0002000920
-
Denial of Service Attacks Rip the Internet
-
Apr.
-
Lee Gerber, "Denial of Service Attacks Rip the Internet," IEEE Computer, vol. 33, no. 4, Apr. 2000, pp. 12-17.
-
(2000)
IEEE Computer
, vol.33
, Issue.4
, pp. 12-17
-
-
Gerber, L.1
-
30
-
-
84966591863
-
Denial-of-Service Attacks
-
Apr.
-
P. G. Neumann, "Denial-of-Service Attacks," ACM Commun., vol 43. no. 4, Apr. 2000, pp. 136.
-
(2000)
ACM Commun.
, vol.43
, Issue.4
, pp. 136
-
-
Neumann, P.G.1
-
31
-
-
33746715594
-
PING Attack - How Bad Is It?
-
July
-
S. Kumar, "PING Attack - How Bad Is It?" Comp. & Sec. J., vol. 25, issue 5, July 2006, pp. 332-37.
-
(2006)
Comp. & Sec. J.
, vol.25
, Issue.5
, pp. 332-337
-
-
Kumar, S.1
-
32
-
-
26844496827
-
On Impact of Distributed Denial of Service (DDoS) Attack due to ARP Storm
-
Springer-Verlag, Apr.
-
S. Kumar, "On Impact of Distributed Denial of Service (DDoS) Attack due to ARP Storm," Lecture Notes in Comp. Sci., vol. LNCS-3421, Springer-Verlag, Apr. 2005.
-
(2005)
Lecture Notes in Comp. Sci.
, vol.LNCS-3421
-
-
Kumar, S.1
-
33
-
-
1242287724
-
Denial-of-Service: A Framework for Classifying Denial of Service Attacks
-
A. Hussain, J. Heidemann, and C. Papadopoulos, "Denial-of-Service: A Framework for Classifying Denial of Service Attacks," Proc. Conf. Apps., Tech., Architectures, and Protocols for Comp. Commun., Aug. 2003, pp. 99-110.
-
Proc. Conf. Apps., Tech., Architectures, and Protocols for Comp. Commun., Aug. 2003
, pp. 99-110
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
34
-
-
0038443107
-
A Taxonomy of Web Attacks Suitable for Efficient Encoding
-
G. Alvarez and S. Petrovic, "A Taxonomy of Web Attacks Suitable for Efficient Encoding," Comp. & Sec., vol. 22, no. 5, 2003, pp. 435-49.
-
(2003)
Comp. & Sec.
, vol.22
, Issue.5
, pp. 435-449
-
-
Alvarez, G.1
Petrovic, S.2
-
35
-
-
30344461584
-
The Denial-of-Service Dance
-
Nov.-Dec.
-
P. L. Campbell, "The Denial-of-Service Dance," IEEE Sec. & Privacy, vol. 3, no. 6, Nov.-Dec. 2005, pp. 34-40.
-
(2005)
IEEE Sec. & Privacy
, vol.3
, Issue.6
, pp. 34-40
-
-
Campbell, P.L.1
-
36
-
-
30344447665
-
A Framework for Countering Denial-of-Information Attacks
-
Nov.-Dec.
-
G. Conti and M. Ahamad, "A Framework for Countering Denial-of-Information Attacks," IEEE Sec. & Privacy, vol. 3, no. 6, Nov.-Dec. 2005, pp. 50-56.
-
(2005)
IEEE Sec. & Privacy
, vol.3
, Issue.6
, pp. 50-56
-
-
Conti, G.1
Ahamad, M.2
-
37
-
-
0002885224
-
Prudent Engineering Practice for Cryptographic Protocols
-
Jan
-
M. Abadi and R. Needham, "Prudent Engineering Practice for Cryptographic Protocols," IEEE Trans. Software Eng., vol. 22, no. 1, Jan 1996, pp. 6-15.
-
(1996)
IEEE Trans. Software Eng.
, vol.22
, Issue.1
, pp. 6-15
-
-
Abadi, M.1
Needham, R.2
-
38
-
-
0036793924
-
Denial of Service in Sensor Networks
-
Oct.
-
A. Wood and J. A. Stankovic, "Denial of Service in Sensor Networks," IEEE Computer, vol. 35, no. 10, Oct. 2002, pp. 54-62.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.1
Stankovic, J.A.2
-
39
-
-
3042785862
-
The Sybil Attack in Sensor Networks: Analysis & Defenses
-
J. Newsome et al., "The Sybil Attack in Sensor Networks: Analysis & Defenses," Proc. 3rd Int'l Symp. Info. Processing in Sensor Networks, Berkeley, CA, 2004, pp. 259-68.
-
Proc. 3rd Int'l Symp. Info. Processing in Sensor Networks, Berkeley, CA, 2004
, pp. 259-268
-
-
Newsome, J.1
-
40
-
-
12844286929
-
The Shellcode Generation
-
Sept.-Oct.
-
I. Arce, "The Shellcode Generation," IEEE Sec. & Privacy, vol. 2, no. 5, Sept.-Oct. 2004, pp.72-76.
-
(2004)
IEEE Sec. & Privacy
, vol.2
, Issue.5
, pp. 72-76
-
-
Arce, I.1
-
41
-
-
14944372809
-
Security in VANET: Detecting and Correcting Malicious Data in VANETs
-
P. Golle, D. Greene, and J. Staddon, "Security in VANET: Detecting and Correcting Malicious Data in VANETs," Proc. 1st ACM Wksp. Vehic. Ad Hoc Networks, Oct. 2004, pp. 29-37.
-
Proc. 1st ACM Wksp. Vehic. Ad Hoc Networks, Oct. 2004
, pp. 29-37
-
-
Golle, P.1
Greene, D.2
Staddon, J.3
-
42
-
-
3142684130
-
A Taxonomy for Attacks on Mobile Agent
-
4-7 July
-
M. C. Man and V. K. Wei, "A Taxonomy for Attacks on Mobile Agent," EUROCON 2001, vol. 2, 4-7 July 2001, pp. 385-88.
-
(2001)
EUROCON 2001
, vol.2
, pp. 385-388
-
-
Man, M.C.1
Wei, V.K.2
-
43
-
-
84892618626
-
Integration of an Internet Attack Simulator in an HLA Environment
-
J. R. Mostow, J. D. Roberts, and J. Bott, "Integration of an Internet Attack Simulator in an HLA Environment," Proc. IEEE Wksp. Info. Assurance and Sec., West Point, NY, June 6-7, 2000.
-
Proc. IEEE Wksp. Info. Assurance and Sec., West Point, NY, June 6-7, 2000
-
-
Mostow, J.R.1
Roberts, J.D.2
Bott, J.3
-
46
-
-
0016336411
-
Operating System Integrity in OS/VS2
-
W. S. McPhee, "Operating System Integrity in OS/VS2," IBM Sys. J., vol. 13, no. 3, 1974, pp. 230-52.
-
(1974)
IBM Sys. J.
, vol.13
, Issue.3
, pp. 230-252
-
-
McPhee, W.S.1
-
47
-
-
0003513832
-
-
Tech. rep. NBSIR 76-1041, Lawrence Livermore Lab., Inst. for Comp. Sci. and Tech./Nat'l. Bureau of Standards, RISOS Project, Washington, DC, Apr.
-
R. P. Abbott et al., "Security Analysis and Enhancements of Computer Operating Systems," Tech. rep. NBSIR 76-1041, Lawrence Livermore Lab., Inst. for Comp. Sci. and Tech./Nat'l. Bureau of Standards, RISOS Project, Washington, DC, Apr. 1976.
-
(1976)
Security Analysis and Enhancements of Computer Operating Systems
-
-
Abbott, R.P.1
-
50
-
-
0004229237
-
-
Ph.D. dissertation, Purdue Univ., Coast TR 98-09
-
I. Krsul, "Software Vulnerability Analysis," Ph.D. dissertation, Purdue Univ., Coast TR 98-09, 1998.
-
(1998)
Software Vulnerability Analysis
-
-
Krsul, I.1
-
51
-
-
0003949225
-
-
M.S. thesis, Dept. of Comp. Sci., Purdue Univ., Coast TR 95-09
-
T. Aslam, "A Taxonomy of Security Faults in the Unix Operating System," M.S. thesis, Dept. of Comp. Sci., Purdue Univ., Coast TR 95-09, 1995.
-
(1995)
A Taxonomy of Security Faults in the Unix Operating System
-
-
Aslam, T.1
-
52
-
-
0037903656
-
Analysis of Vulnerabilities in Internet Firewalls
-
S. Kamara et al., "Analysis of Vulnerabilities in Internet Firewalls," Comp. & Sec., vol. 22, no. 3, 2003, pp. 214-32.
-
(2003)
Comp. & Sec.
, vol.22
, Issue.3
, pp. 214-232
-
-
Kamara, S.1
-
53
-
-
1942521938
-
Taxonomy of Security Considerations and Software Quality
-
June
-
H. Wang and C. Wang, "Taxonomy of Security Considerations and Software Quality," Commun. ACM, vol. 46, no. 6, June 2003, pp. 75-78.
-
(2003)
Commun. ACM
, vol.46
, Issue.6
, pp. 75-78
-
-
Wang, H.1
Wang, C.2
-
54
-
-
30344442772
-
Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors
-
Nov.-Dec.
-
K. Tsipenyuk, B. Chess, andG. McGraw, "Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors," IEEE Sec. & Privacy, vol. 3, no. 6, Nov.-Dec. 2005, pp. 81-84.
-
(2005)
IEEE Sec. & Privacy
, vol.3
, Issue.6
, pp. 81-84
-
-
Tsipenyuk, K.1
Chess, B.2
McGraw, G.3
-
55
-
-
34547322724
-
Software Vulnerability Analysis for Web Services Software Systems
-
W. D. Yu, D. Aravind, and P. Supthaweesuk, "Software Vulnerability Analysis for Web Services Software Systems," Proc. 11th IEEE Symp. Comp. and Commun, 26-29 June 2006, pp. 740-48.
-
Proc. 11th IEEE Symp. Comp. And Commun, 26-29 June 2006
, pp. 740-748
-
-
Yu, W.D.1
Aravind, D.2
Supthaweesuk, P.3
-
57
-
-
77956789667
-
Protection
-
B. Lampson, "Protection," Proc. 5th Princeton Conf. Info. Sci. and Sys., Princeton, NJ, 1971,
-
Proc. 5th Princeton Conf. Info. Sci. and Sys., Princeton, NJ, 1971
-
-
Lampson, B.1
-
58
-
-
3142654848
-
-
Reprinted in Jan.
-
Reprinted in ACM Op. Sys. Rev. 8, no. 1, Jan. 1974, pp 18-24.
-
(1974)
ACM Op. Sys. Rev.
, vol.8
, Issue.1
, pp. 18-24
-
-
-
60
-
-
31344451091
-
Security Vulnerabilities: From Analysis to Detection and Masking Techniques
-
Feb.
-
S. Chen et al., "Security Vulnerabilities: From Analysis to Detection and Masking Techniques," Proc. IEEE, vol. 94, no. 2, Feb. 2006, pp. 407-18.
-
(2006)
Proc. IEEE
, vol.94
, Issue.2
, pp. 407-418
-
-
Chen, S.1
-
62
-
-
0011192575
-
-
CERT(r) Advisory CA-1997-28
-
IP Denial-of-Service Attacks, CERT(r) Advisory CA-1997-28, http://www.cert.org/advisories/CA-1997-28.html
-
IP Denial-of-Service Attacks
-
-
-
63
-
-
0024122244
-
Methodology for Network Communication Vulnerability Analysis
-
23-26 Oct.
-
M. P. Ristenbatt, "Methodology for Network Communication Vulnerability Analysis," MILCOM 1988, vol. 2, 23-26 Oct., pp. 493-99.
-
(1988)
MILCOM
, vol.2
, pp. 493-499
-
-
Ristenbatt, M.P.1
-
64
-
-
84892561987
-
Network Security - A Taxonomic View
-
28-30 Apr.
-
N. D. Jayaram and P. L. R. Morse, "Network Security - A Taxonomic View," Proc. Euro. Conf. Sec. and Detection, School of Comp. Sci., Univ. of Westmister, U.K., no. 437, 28-30 Apr. 1997.
-
(1997)
Proc. Euro. Conf. Sec. And Detection, School of Comp. Sci., Univ. Of Westmister, U.K.
, Issue.437
-
-
Jayaram, N.D.1
Morse, P.L.R.2
-
65
-
-
33644591555
-
Wireless Security Threat Taxonomy
-
D. Welch and S. Lathrop, "Wireless Security Threat Taxonomy," Info. Assurance Wksp., IEEE Sys., Man and Cybernetics Soc., 18-20 June 2003, pp. 76-83.
-
Info. Assurance Wksp., IEEE Sys., Man and Cybernetics Soc., 18-20 June 2003
, pp. 76-83
-
-
Welch, D.1
Lathrop, S.2
-
66
-
-
0002738343
-
Security Problems in the TCP/IP Protocol Suite
-
Apr.
-
S. M. Bellovin, "Security Problems in the TCP/IP Protocol Suite," Comp. Commun. Rev., vol. 2, no. 19, Apr. 1989, pp. 32-48.
-
(1989)
Comp. Commun. Rev.
, vol.2
, Issue.19
, pp. 32-48
-
-
Bellovin, S.M.1
-
68
-
-
11144298155
-
A Vulnerability Taxonomy for Network Protocols: Corresponding Engineering Best Practice Countermeasures
-
V. Pothamsetty and B. Akyol, "A Vulnerability Taxonomy for Network Protocols: Corresponding Engineering Best Practice Countermeasures," Proc. 3rd IASTED Int'l Conf. Commun., Internet, and Info. Tech., 2004, pp. 168-75.
-
Proc. 3rd IASTED Int'l Conf. Commun., Internet, and Info. Tech., 2004
, pp. 168-175
-
-
Pothamsetty, V.1
Akyol, B.2
-
69
-
-
33646930309
-
Vulnerability Analysis and Best Practices for Adopting IP Telephony in Critical Infrastructure Sectors
-
Apr.
-
F. Cao and S. Malik, "Vulnerability Analysis and Best Practices for Adopting IP Telephony in Critical Infrastructure Sectors," IEEE Commun. Mag., vol. 44, no. 4, Apr. 2006, pp. 138-45.
-
(2006)
IEEE Commun. Mag.
, vol.44
, Issue.4
, pp. 138-145
-
-
Cao, F.1
Malik, S.2
|