• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

DMCA

Vulnerabilities Analysis (1999)

Cached

  • Download as a PDF

Download Links

  • [nob.cs.ucdavis.edu]
  • [seclab.cs.ucdavis.edu]
  • [nob.cs.ucdavis.edu]

  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Matt Bishop
Citations:556 - 15 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@INPROCEEDINGS{Bishop99vulnerabilitiesanalysis,
    author = {Matt Bishop},
    title = {Vulnerabilities Analysis},
    booktitle = {},
    year = {1999},
    publisher = {McGraw-Hill}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

This note presents a new model for classifying vulnerabilities in computer systems. The model is structurally different than earlier models, It decomposes vulnerabilities into small parts, called "primitive conditions. " Our hypothesis is that by examining systems for these conditions, we can detect vulnerabilities. By preventing these conditions from holding, we can prevent vulnerabilities from occurring, even if we do not know that the vulnerability exists. A formal basis for this model is presented. An informal, experimental method of validation for non- secure systems is described. If the model accurately describes existing systems, it guides the development of tools to analyze systems for vulnerabilities. 1.

Keyphrases

small part    formal basis    non secure system    computer system    new model    experimental method    primitive condition   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University