Results 1 - 10
of
1,439
A Taxonomy of Computer Program Security Flaws, with Examples
, 1993
"... This paper provides a taxonomy for computer program security flaws together with an appendix that carefully documents 50 actual security flaws. These flaws have all been described previously in the open literature, but in widely separated places. For those new to the field of computer security, they ..."
Abstract
-
Cited by 182 (3 self)
- Add to MetaCart
This paper provides a taxonomy for computer program security flaws together with an appendix that carefully documents 50 actual security flaws. These flaws have all been described previously in the open literature, but in widely separated places. For those new to the field of computer security
Security Flaw in MIFARE Classic
"... University Nijmegen have discovered a serious security flaw in a widely used type of contactless smartcard [9], also called RFID tag. It concerns the ”Mifare Classic ” RFID card produced by NXP (formerly Philips Semiconductors). Earlier, German researchers Karsten Nohl en Henryk Pltz pointed out sec ..."
Abstract
- Add to MetaCart
University Nijmegen have discovered a serious security flaw in a widely used type of contactless smartcard [9], also called RFID tag. It concerns the ”Mifare Classic ” RFID card produced by NXP (formerly Philips Semiconductors). Earlier, German researchers Karsten Nohl en Henryk Pltz pointed out
Towards an analytic model of security flaws
, 2004
"... security, models, flaws, branching process, analytic A simple model of the dynamics of flaws within a software security system is presented. We demonstrate how this model can be fully captured by a Galton-Watson branching process and thus can be effectively calculated upon. Using the limit behaviour ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
security, models, flaws, branching process, analytic A simple model of the dynamics of flaws within a software security system is presented. We demonstrate how this model can be fully captured by a Galton-Watson branching process and thus can be effectively calculated upon. Using the limit
Evaluating the Security Flaws in Web Applications
"... Web security is an important area of research. This work has focused on web securing schemes. The primary concentration is to interpret the way to handle the SQL Injections. It is one of the many web attack methods used by hackers to steal data from industries. It is one of the most usual technique ..."
Abstract
- Add to MetaCart
Web security is an important area of research. This work has focused on web securing schemes. The primary concentration is to interpret the way to handle the SQL Injections. It is one of the many web attack methods used by hackers to steal data from industries. It is one of the most usual technique
Static Detection of Security Flaws in Object-Oriented Databases
"... Access control in function granularity is one of the features of many object-oriented databases. In those systems, the users are granted rights to invoke composed functions instead of rights to invoke primitive operations. Although primitive operations are invoked inside composed functions, the user ..."
Abstract
- Add to MetaCart
, the users can invoke them only through the granted functions. This achieves access control in abstract operation level. Access control utilizing encapsulated functions, however, easily causes many “security flaws ” through which malicious users can bypass the encapsulation and can abuse the primitive
Static Detection of Security Flaws in Object-Oriented Databases
- Proc. 15th ACM SIGMOD
, 1996
"... Access control in function granularity is one of the features of many object-oriented databases. In those systems, the users are granted rights to invoke composed functions instead of rights to invoke primitive operations. Although primitive operations are invoked inside composed functions, the user ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
, the users can invoke them only through the granted functions. This achieves access control in abstract operation level. Access control utilizing encapsulated functions, however, easily causes many ``security flaws'' through which malicious users can bypass the encapsulation and can abuse
Security Flaws in Several Group Signatures Proposed by Popescu
, 2003
"... In resent years, Popescu proposed several group signature schemes based on the Okamoto-Shiraishi assumption in [8--11], and claimed his schemes are secure. However, this paper demonstrates that these schemes are all insecure by identifying some security flaws. Exploiting these flaws, an attacker ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
In resent years, Popescu proposed several group signature schemes based on the Okamoto-Shiraishi assumption in [8--11], and claimed his schemes are secure. However, this paper demonstrates that these schemes are all insecure by identifying some security flaws. Exploiting these flaws
Security Flaws in the HotJava Web Browser
- In Proceedings 1996 IEEE Symposium on Security and Privacy. IEEE Computer
, 1995
"... The growth of the Internet and the World Wide Web has led to demand for Web extensions, such as the ability to run server-supplied code on a Web client. We examine the HotJava Web browser and the Java language in which it is implemented. We demonstrate several attacks that compromise HotJava's ..."
Abstract
-
Cited by 9 (0 self)
- Add to MetaCart
of application requirements and security needs and suggest how they can both be accommodated. 1 Introduction This paper describes several security flaws we found in Sun's HotJava Web browser and attacks that exploit those flaws. We have implemented denial of service and man-in-the-middle attacks. We have
Security Flaws in 802.11 Data Link Protocols
, 2003
"... this article. Problems With WEP WEP has several serious inherent problems. It does not meet its fundamental goals of wired-equivalent confidentiality. It also fails to meet the expected goals for integrity and authentication ..."
Abstract
-
Cited by 48 (1 self)
- Add to MetaCart
this article. Problems With WEP WEP has several serious inherent problems. It does not meet its fundamental goals of wired-equivalent confidentiality. It also fails to meet the expected goals for integrity and authentication
A Formal Approach to Detecting Security Flaws in Object-Oriented Databases
, 1999
"... this paper is to show an efficient decision algorithm for detecting a security flaw under a given authorization. This problem is solvable in polynomial time in practical cases by reducing it to the congruence closure problem. This paper also mentions the problem of finding a maximal subset of a give ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
this paper is to show an efficient decision algorithm for detecting a security flaw under a given authorization. This problem is solvable in polynomial time in practical cases by reducing it to the congruence closure problem. This paper also mentions the problem of finding a maximal subset of a
Results 1 - 10
of
1,439