Results 1 - 10
of
8,725
Security Vulnerabilities
"... This reference discusses the reasons why an organization should use encryption to protect their videoconferencing sessions. Why Security? Security is becoming a growing concern for companies as they increase their adoption of videoconferencing. Much of this concern stems from unauthorized people &qu ..."
Abstract
- Add to MetaCart
This reference discusses the reasons why an organization should use encryption to protect their videoconferencing sessions. Why Security? Security is becoming a growing concern for companies as they increase their adoption of videoconferencing. Much of this concern stems from unauthorized people
Static Detection of Security Vulnerabilities in Scripting Languages
"... We present a static analysis algorithm for detecting security vulnerabilities in PHP, a popular server-side scripting language for building web applications. Our analysis employs a novel three-tier architecture to capture information at decreasing levels of granularity at the intrablock, intraproced ..."
Abstract
-
Cited by 197 (3 self)
- Add to MetaCart
We present a static analysis algorithm for detecting security vulnerabilities in PHP, a popular server-side scripting language for building web applications. Our analysis employs a novel three-tier architecture to capture information at decreasing levels of granularity at the intrablock
Security vulnerabilities in DNS and DNSSEC
"... We present an analysis of security vulnerabilities in the Domain Name System (DNS) and the DNS Security Extensions (DNSSEC). DNS data that is provided by name servers lacks support for data origin authentication and data integrity. This makes DNS vulnerable to man in the middle (MITM) attacks, as we ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
We present an analysis of security vulnerabilities in the Domain Name System (DNS) and the DNS Security Extensions (DNSSEC). DNS data that is provided by name servers lacks support for data origin authentication and data integrity. This makes DNS vulnerable to man in the middle (MITM) attacks
Finding Security Vulnerabilities in Java Applications with Static Analysis
, 2005
"... This paper proposes a static analysis technique for detecting many recently discovered application vulnerabilities such as SQL injections, cross-site scripting, and HTTP splitting attacks. These vulnerabilities stem from unchecked input, which is widely recognized as the most common source of securi ..."
Abstract
-
Cited by 169 (3 self)
- Add to MetaCart
of security vulnerabilities in Web applications. We propose a static analysis approach based on a scalable and precise points-to analysis. In our system, user-provided specifications of vulnerabilities are automatically translated into static analyzers. Our approach finds all vulnerabilities matching a
IPv6 Security Vulnerabilities
"... Abstract- Internet Protocol version 6 (IPv6) is the newest version of the protocol that is used for communications on the Internet. This version has been in existence for many years. But, currently many organizations have slowed their migration to IPv6 because they realize that the security consider ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
considerations and products for IPv6 might be insufficient, despite the fact that the network infrastructure is ready to support IPv6 transport. They realize that they cannot deploy IPv6 without considering the security of this protocol at first. IPv6 security vulnerabilities currently exist
Analysis of Security Vulnerabilities in the Movie
- In The 2003 ACM Workshop on DRM
, 2003
"... Unauthorized copying of movies is a major concern for the motion picture industry. While unauthorized copies of movies have been distributed via portable physical media for some time, low-cost, high-bandwidth Internet connections and peer-to-peer file sharing networks provide highly efficient distri ..."
Abstract
- Add to MetaCart
security vulnerabilities that may lead to unauthorized copies becoming available to those who may wish to redistribute them. Finally, we offer recommendations for reducing security vulnerabilities in the movie production and distribution process.
Vulnerabilities Analysis
, 1999
"... This note presents a new model for classifying vulnerabilities in computer systems. The model is structurally different than earlier models, It decomposes vulnerabilities into small parts, called "primitive conditions. " Our hypothesis is that by examining systems for these conditi ..."
Abstract
-
Cited by 557 (15 self)
- Add to MetaCart
for these conditions, we can detect vulnerabilities. By preventing these conditions from holding, we can prevent vulnerabilities from occurring, even if we do not know that the vulnerability exists. A formal basis for this model is presented. An informal, experimental method of validation for non- secure systems
Security Vulnerabilities in Event-Driven Systems
- Proceedings of IFIP SEC’2002. Pp
, 2002
"... The event-driven model is a model commonly used in the implementation of systems such as the Graphical User Interface (GUI). While it offers important advantages over alternative choices, it often exhibits security vulnerabilities due to its architectural characteristics in the handling of events. I ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
The event-driven model is a model commonly used in the implementation of systems such as the Graphical User Interface (GUI). While it offers important advantages over alternative choices, it often exhibits security vulnerabilities due to its architectural characteristics in the handling of events
Hardware and Security: Vulnerabilities and Solutions
"... This chapter introduces the role that computer hardware plays for attack and defense in cyberphysical systems. Hardware security – whether for attack or defense – differs from software, network, ..."
Abstract
- Add to MetaCart
This chapter introduces the role that computer hardware plays for attack and defense in cyberphysical systems. Hardware security – whether for attack or defense – differs from software, network,
Results 1 - 10
of
8,725