• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,439
Next 10 →

A Taxonomy of Computer Program Security Flaws, with Examples

by Carl Landwehr, Alan R. Bull, John P. Mcdermott, William, S. Choi , 1993
"... This paper provides a taxonomy for computer program security flaws together with an appendix that carefully documents 50 actual security flaws. These flaws have all been described previously in the open literature, but in widely separated places. For those new to the field of computer security, they ..."
Abstract - Cited by 182 (3 self) - Add to MetaCart
This paper provides a taxonomy for computer program security flaws together with an appendix that carefully documents 50 actual security flaws. These flaws have all been described previously in the open literature, but in widely separated places. For those new to the field of computer security

Security Flaw in MIFARE Classic

by Ronny Wichers Schreur, Peter Van Rossum, Flavio Garcia, Wouter Teepe, Bart Jacobs, Gerhard De Koning Gans, Roel Verdult, Ruben Muijrers, Ravindra Kali, Vinesh Kali
"... University Nijmegen have discovered a serious security flaw in a widely used type of contactless smartcard [9], also called RFID tag. It concerns the ”Mifare Classic ” RFID card produced by NXP (formerly Philips Semiconductors). Earlier, German researchers Karsten Nohl en Henryk Pltz pointed out sec ..."
Abstract - Add to MetaCart
University Nijmegen have discovered a serious security flaw in a widely used type of contactless smartcard [9], also called RFID tag. It concerns the ”Mifare Classic ” RFID card produced by NXP (formerly Philips Semiconductors). Earlier, German researchers Karsten Nohl en Henryk Pltz pointed out

Towards an analytic model of security flaws

by Chris Tofts, Brian Monahan, Chris Tofts, Brian Monahan , 2004
"... security, models, flaws, branching process, analytic A simple model of the dynamics of flaws within a software security system is presented. We demonstrate how this model can be fully captured by a Galton-Watson branching process and thus can be effectively calculated upon. Using the limit behaviour ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
security, models, flaws, branching process, analytic A simple model of the dynamics of flaws within a software security system is presented. We demonstrate how this model can be fully captured by a Galton-Watson branching process and thus can be effectively calculated upon. Using the limit

Evaluating the Security Flaws in Web Applications

by Prabhdeep Kaur, Harkamal Kaur
"... Web security is an important area of research. This work has focused on web securing schemes. The primary concentration is to interpret the way to handle the SQL Injections. It is one of the many web attack methods used by hackers to steal data from industries. It is one of the most usual technique ..."
Abstract - Add to MetaCart
Web security is an important area of research. This work has focused on web securing schemes. The primary concentration is to interpret the way to handle the SQL Injections. It is one of the many web attack methods used by hackers to steal data from industries. It is one of the most usual technique

Static Detection of Security Flaws in Object-Oriented Databases

by unknown authors
"... Access control in function granularity is one of the features of many object-oriented databases. In those systems, the users are granted rights to invoke composed functions instead of rights to invoke primitive operations. Although primitive operations are invoked inside composed functions, the user ..."
Abstract - Add to MetaCart
, the users can invoke them only through the granted functions. This achieves access control in abstract operation level. Access control utilizing encapsulated functions, however, easily causes many “security flaws ” through which malicious users can bypass the encapsulation and can abuse the primitive

Static Detection of Security Flaws in Object-Oriented Databases

by Keishi Tajima - Proc. 15th ACM SIGMOD , 1996
"... Access control in function granularity is one of the features of many object-oriented databases. In those systems, the users are granted rights to invoke composed functions instead of rights to invoke primitive operations. Although primitive operations are invoked inside composed functions, the user ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
, the users can invoke them only through the granted functions. This achieves access control in abstract operation level. Access control utilizing encapsulated functions, however, easily causes many ``security flaws'' through which malicious users can bypass the encapsulation and can abuse

Security Flaws in Several Group Signatures Proposed by Popescu

by Guilin Wang, Sihan Qing , 2003
"... In resent years, Popescu proposed several group signature schemes based on the Okamoto-Shiraishi assumption in [8--11], and claimed his schemes are secure. However, this paper demonstrates that these schemes are all insecure by identifying some security flaws. Exploiting these flaws, an attacker ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
In resent years, Popescu proposed several group signature schemes based on the Okamoto-Shiraishi assumption in [8--11], and claimed his schemes are secure. However, this paper demonstrates that these schemes are all insecure by identifying some security flaws. Exploiting these flaws

Security Flaws in the HotJava Web Browser

by Drew Dean, Dan S. Wallach - In Proceedings 1996 IEEE Symposium on Security and Privacy. IEEE Computer , 1995
"... The growth of the Internet and the World Wide Web has led to demand for Web extensions, such as the ability to run server-supplied code on a Web client. We examine the HotJava Web browser and the Java language in which it is implemented. We demonstrate several attacks that compromise HotJava's ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
of application requirements and security needs and suggest how they can both be accommodated. 1 Introduction This paper describes several security flaws we found in Sun's HotJava Web browser and attacks that exploit those flaws. We have implemented denial of service and man-in-the-middle attacks. We have

Security Flaws in 802.11 Data Link Protocols

by Nancy Cam-winget, Russ Housley, David Wagner, Jesse Walker , 2003
"... this article. Problems With WEP WEP has several serious inherent problems. It does not meet its fundamental goals of wired-equivalent confidentiality. It also fails to meet the expected goals for integrity and authentication ..."
Abstract - Cited by 48 (1 self) - Add to MetaCart
this article. Problems With WEP WEP has several serious inherent problems. It does not meet its fundamental goals of wired-equivalent confidentiality. It also fails to meet the expected goals for integrity and authentication

A Formal Approach to Detecting Security Flaws in Object-Oriented Databases

by Toshiyuki Morita, Yasunori Ishihara, Hiroyuki Seki, Minoru Ito , 1999
"... this paper is to show an efficient decision algorithm for detecting a security flaw under a given authorization. This problem is solvable in polynomial time in practical cases by reducing it to the congruence closure problem. This paper also mentions the problem of finding a maximal subset of a give ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
this paper is to show an efficient decision algorithm for detecting a security flaw under a given authorization. This problem is solvable in polynomial time in practical cases by reducing it to the congruence closure problem. This paper also mentions the problem of finding a maximal subset of a
Next 10 →
Results 1 - 10 of 1,439
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University