Sciweavers

419 search results - page 4 / 84
» An Automated Approach for Identifying Potential Vulnerabilit...
Sort
View
KBSE
2005
IEEE
14 years 2 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard
ACSAC
2007
IEEE
14 years 2 months ago
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting
We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a Dynamic Markov Model fitness heuristic. This heuristic allows us t...
Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cl...
CCS
2005
ACM
14 years 2 months ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar
HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
14 years 2 months ago
Web Application Scanners: Definitions and Functions
There are many commercial software security assurance tools that claim to detect and prevent vulnerabilities in application software. However, a closer look at the tools often lea...
Elizabeth Fong, Vadim Okun
APSCC
2008
IEEE
13 years 10 months ago
Contract-Based Security Monitors for Service Oriented Software Architecture
Monitors have been used for real-time systems to ensure proper behavior; however, most approaches do not allow for the addition of relevant fields required to identify and react t...
Alexander M. Hoole, Issa Traoré