• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Security Flaws in the HotJava Web Browser (1995)

by D Dean, D S Wallach
Add To MetaCart

Tools

Sorted by:
Results 1 - 9 of 9

Software Vulnerability Analysis

by Ivan Victor Krsul , 1998
"... ..."
Abstract - Cited by 108 (1 self) - Add to MetaCart
Abstract not found

Challenges in Computer Security Education

by Cynthia E Irvine - IEEE Software , 1997
"... Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments ..."
Abstract - Cited by 8 (4 self) - Add to MetaCart
Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information,
(Show Context)

Citation Context

...pers analyzing specific incidents of flaw exploitation such as the Internet Worm of 1988 [10]; categorization of flaws in various systems, e.g. [7]; identification of flaws in specific products, e.g. =-=[4]-=-; and techniques for remedying these flaws. The second approach is to build security into our systems ab initio using an engineering-oriented approach based on fundamental principles. Here it is assum...

A DNS Filter and Switch for Packet-filtering Gateways

by Bill Cheswick, Lucent Technologies, Bill Cheswick, Steven M. Bellovin - In Proc. Usenix , 1996
"... IP-transparent firewalls require access to the external Domain Name System (DNS) from protected in-ternal hosts. Misconfigurations and misuse of this system can create internal administrative and security problems. Dnsproxy provides access to and protection from untrusted DNS services. It runs on a ..."
Abstract - Cited by 6 (1 self) - Add to MetaCart
IP-transparent firewalls require access to the external Domain Name System (DNS) from protected in-ternal hosts. Misconfigurations and misuse of this system can create internal administrative and security problems. Dnsproxy provides access to and protection from untrusted DNS services. It runs on a firewall, or on a trusted host just inside the firewall. The program receives (or intercepts) DNS queries and forwards them to an appropriate internal or external “realm ” for processing. The responses can be checked, filtered, and modified before they are returned to the requester. The logging and consistency checks can provide infor-mation about possible DNS attacks and irregularities that are not available from most DNS implementa-tions.
(Show Context)

Citation Context

...uld an attacker harm us if he said his host was on one of our internal nets. We couldn’t think of an attack, but one turned up in February involving Java (see CERT Advisory CA-96.05, March, 1996, and =-=[4]-=-). It was easy to install the check, because we had the right tool in place. Dnsproxy Dnsproxy is a DNS switch and filter. To clients it looks like a name server. We run it on two internal hosts; the ...

An Experience Teaching a Graduate Course in Cryptography

by Aviel D. Rubin - Journal of Information Systems Education , 1997
"... We describe an experience of teaching "Cryptography and Computer Security" in the fall of 1995 at New York University. The class was intended as an introduction for graduate students interested in exploring the historical, theoretical and practical aspects of computer security. Topics cove ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
We describe an experience of teaching "Cryptography and Computer Security" in the fall of 1995 at New York University. The class was intended as an introduction for graduate students interested in exploring the historical, theoretical and practical aspects of computer security. Topics covered include classical cryptography, elementary number theory, several security systems, and protocols. The focus on breadth was intentional as the goal of the course was to give students with widely devergent backgrounds exposure to different areas that might interest them. The course content as well as lessons learned and plans for the future are discussed. 1 Introduction This paper describes a course titled "Cryptography and Computer Security" that was taught at New York University in the Fall of 1995. The department head at NYU requested a course for practitioners, with an emphasis on applications and real-world problems. Thus, there were four phases to the course, classical cryptography, conventi...

An Analysis of Some Software Vulnerabilities

by Ivan Krsul, Eugene H. Spafford, Mahesh Tripunitara - IN PROCEESINGS OF THE 21ST NIST-NCSC NATIONAL INFORMATION SYSTEMS SYMPOSIUM , 1998
"... Many engineering fields have recognized the need to analyze past mistakes and failures in the hope of learning from them. In computer science this realization has resulted in the development of software testing techniques that attempt to detect known problems from software systems and in improved co ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
Many engineering fields have recognized the need to analyze past mistakes and failures in the hope of learning from them. In computer science this realization has resulted in the development of software testing techniques that attempt to detect known problems from software systems and in improved compilers and development tools. However, there exists a series of software failures where detailed analysis is rarely published, mainly for fear that the information could be used against active systems. These software failures, commonly referred to as computer vulnerabilities, have special properties that set them apart from traditional software failures. Detailed analysis of the factors that contribute to the existence of these vulnerabilities is mostly limited to cryptic articles posted to hacker newsgroups or web sites. There are a few notable exceptions, and this report attempts to add to these with a detailed analysis of four common computer vulnerabilities. The analysis of each vulnera...

Unifying Internet Services Using Distributed Shared Objects

by Philip Homburg, Maarten Van Steen, Andrew S. Tanenbaum - Fac. of Math. & C.Sc., Vrije Universiteit, Internal report IR-409 , 1996
"... Developing wide area applications such as those for sharing data across the Internet is unnecessarily difficult. The main problem is the widespread use of a communication paradigm that is too low level. We will show how wide area application development can be made easier when using distributed shar ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
Developing wide area applications such as those for sharing data across the Internet is unnecessarily difficult. The main problem is the widespread use of a communication paradigm that is too low level. We will show how wide area application development can be made easier when using distributed shared objects instead of a communication-oriented model. An object in our model is physically distributed, with multiple copies of its state on different machines. All implementation aspects such as replication, distribution, and migration of state, are hidden from users through an object's interface. In this paper, we concentrate on the application of distributed shared objects, by providing an outline of a middleware solution that permits integration of the Internet services for e-mail, News, file transfer, and Web documents. vrije Universiteit Faculty of Mathematics and Computer Science 1 Introduction Constructing wide area applications, such as those for sharing data across the Internet,...
(Show Context)

Citation Context

... addressed. The main problem is the security risks associated with loading new code in a running executable. Experience with Java [1] shows that downloading code over the Internet is not without risk =-=[6]-=-. However, in our case we expect fewer risks as class implementations will generally be locally available, and maintained by the user or by the local system administrator. Unlike Java, we require conf...

Goals for CIomputer Security Education

by Cynthia E. Irvine
"... ..."
Abstract - Add to MetaCart
Abstract not found

Abstract Incentives and Disincentives for DNSSEC Deployment

by unknown authors
"... Like many of the Internet’s foundational infrastructures, ..."
Abstract - Add to MetaCart
Like many of the Internet’s foundational infrastructures,
(Show Context)

Citation Context

... DNSSEC alone will not secure the communication. Furthermore, we have no evidence that address spoofing is anything but exceedingly rare, despite longstanding published reports of DNS vulnerabilities =-=[1, 10, 6, 4, 5]-=-. (There have been distributed denial of service attacks on the DNS root nameservers [11], but DNSSEC does not by itself prevent denial of service.) It seems that no one is trying to corrupt the addre...

SwitchWare: Towards a 21st Century Network Infrastructure

by unknown authors
"... SwitchWare is a set of software technologies which will enable rapid develop-ment and deployment of new network services. By making the basic network service selectable on a per user (or even per packet) basis, the need for formal standardization is eliminated. Additionally, by making the basic netw ..."
Abstract - Add to MetaCart
SwitchWare is a set of software technologies which will enable rapid develop-ment and deployment of new network services. By making the basic network service selectable on a per user (or even per packet) basis, the need for formal standardization is eliminated. Additionally, by making the basic network service programmable, the deployment times, today constrained by capital funding limi-tations, are tremendously reduced (to the order of software distribution times). Finally, by constructing an advanced, robust programming environment, even the service development time can be reduced. A SwitchWare switch consists of input and output ports controlled by a soft-ware-programmable element; programs are contained in sequences of messages sent to the SwitchWare switch’s input ports, which interpret the messages as pro-grams called ‘‘Switchlets’’. This accelerates the pace of network evolution, as ev olving user needs can be immediately reflected in the network infrastructure. Immediate reconfigurability also enhances the adaptability of the network infras-tructure to unexpected situations. A network built from SwitchWare switches is an active network. 1.
(Show Context)

Citation Context

...y question in the design of SwitchWare is how this power can be provided safely. 4.2. Systems Security and Programming Environments Familiarity with the Internet Worm [42] or recent security problems =-=[11]-=- found in systems such as Netscape’s Web browser and the Java [26] highlight the importance of security in distributed computing. Although these problems manifested themselves as security breaches, ma...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University