메뉴 건너뛰기




Volumn , Issue , 2011, Pages 103-110

A model-based attack injection approach for security validation

Author keywords

attack injection; model based testing; security evaluation

Indexed keywords

ATTACK SCENARIOS; ATTACK TREE; COMPLETE CONTROL; DENIAL OF SERVICE; MODEL BASED TESTING; SECURITY BREACHES; SECURITY EVALUATION; SECURITY FAILURE; SECURITY TESTING; SECURITY VULNERABILITIES; TESTING TOOLS; VULNERABLE SYSTEMS; WIRELESS APPLICATION PROTOCOLS;

EID: 83455219837     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2070425.2070443     Document Type: Conference Paper
Times cited : (9)

References (30)
  • 2
    • 84855227349 scopus 로고    scopus 로고
    • Accessed March 1, 2011
    • Broadcasting & Cable, http://www.broadcastingcable.com/article/ 458457-Chilean-Miners-Rescue-Sets-Records-for-Univision.php. Accessed March 1, 2011.
    • Broadcasting & Cable
  • 3
    • 84855218295 scopus 로고    scopus 로고
    • March 1
    • Juniper Research - Low Cost Handsets & Entry Level Smartphones, http://juniperresearch.com/reports/low-cost-handsets-&-entry-level- smartphones, (March 1, 2011).
    • (2011) Low Cost Handsets & Entry Level Smartphones
  • 4
    • 0005505737 scopus 로고    scopus 로고
    • Version 06-Apr-2001, Accessed September 1, 2010
    • Wap Forum - Wireless Transport Layer Security Specification Version 06-Apr-2001, http://www.wapforum.org/what/technical.htm. Accessed September 1, 2010.
    • Wireless Transport Layer Security Specification
  • 9
    • 0142218873 scopus 로고    scopus 로고
    • Fault Injection Tool for Network Security Evaluation
    • Dependable Computing. (Sep. 2003)
    • Wanner, P.C.H. and Weber, R.F. 2003. Fault Injection Tool for Network Security Evaluation. LNCS, vol. 2847/2003, Dependable Computing. Pp 127-136, (Sep. 2003).
    • (2003) LNCS , vol.2847 , Issue.2003 , pp. 127-136
    • Wanner, P.C.H.1    Weber, R.F.2
  • 12
    • 84855251501 scopus 로고    scopus 로고
    • Protos Accessed November 1, 2010
    • Protos - Security Testing of Protocol Implementations, 1999, https://www.ee.oulu.fi/research/ouspg/Protos. Accessed November 1, 2010.
    • (1999) Security Testing of Protocol Implementations
  • 16
    • 15744365243 scopus 로고    scopus 로고
    • Improvements on the WTLS protocol to avoid denial of service attacks
    • 2005
    • Zhang, R. and Chen, K. 2005. Improvements on the WTLS protocol to avoid denial of service attacks. Computers and Security, Elsevier Science, Vol. 24, No 1, pp. 76-82, (2005).
    • (2005) Computers and Security, Elsevier Science , vol.24 , Issue.1 , pp. 76-82
    • Zhang, R.1    Chen, K.2
  • 17
  • 20
    • 0002670359 scopus 로고    scopus 로고
    • Attack Trees: Modeling Security Threats
    • December 1999
    • Schneier, B. 1999. Attack Trees: Modeling Security Threats. Dr. Dobb's Journal, (December 1999).
    • (1999) Dr. Dobb's Journal
    • Schneier, B.1
  • 22
    • 84855217648 scopus 로고    scopus 로고
    • Accessed March 1, 2011
    • Amenaza Technologies Limited - SecureITree, http://www.amenaza.com/. Accessed March 1, 2011.
    • SecureITree
  • 28
    • 84855211882 scopus 로고    scopus 로고
    • Accessed April 1, 2010
    • Columbitech WAP Connector, http://handheld.softpedia.com/get/ Network/Columbitech-WAPConnector-35124.shtml. Accessed April 1, 2010.
    • Columbitech WAP Connector
  • 29
    • 51849145492 scopus 로고    scopus 로고
    • Accessed November 1, 2010
    • Network Packet Generator, http://www.wikistc.org/wiki/Network-packet- generator. Accessed November 1, 2010.
    • Network Packet Generator


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.