نتایج جستجو برای: vulnerability detection

تعداد نتایج: 606748  

2015
Yue Wang Hao Sun Qingkai Zeng

Fork-based symbolic execution would waste large amounts of computing time and resource on invulnerable paths when applied to vulnerability detection. In this paper, we propose a statically-guided fork-based symbolic execution technique for vulnerability detection to mitigate this problem. In static analysis, we collect all valid jumps along vulnerable paths, and define the priority for each pro...

2011
Amel Mammar Ana R. Cavalli Willy Jimenez Wissam Mallouli Edgardo Montes de Oca

This paper presents a technique for vulnerability detection in C programs. It is based on a vulnerability formal model called “Vulnerability Detection Conditions" (VDCs). This model is used together with passive testing techniques for the automatic detection of vulnerabilities. The proposed technique has been implemented in a dynamic code analysis tool, TestInv-Code, which detects the presence ...

2005
Frédéric Massicotte Mathieu Couture Yvan Labiche

Intrusion Detection Systems (IDS) use different techniques to reduce the number of false positives they generate. Simple network context information such as the communication session state has been added in IDS signatures to only raise alarms in the proper context. However, this is often not sufficient and more network context information needs to be added to these Stateful IDS (SIDS) signature...

2004
Maria Papadaki

Addressing security vulnerabilities and system intrusions can represent asignificant administrative overhead in current computer systems. Althoughtechnologies exist for both vulnerability scanning and for intrusion detection,the problems typically require some form of human intervention before theycan be rectified. Evidence suggests that, in many cases, this can lead too...

2007
Kamran Zafar Asad Ali

Software vulnerabilities provide a way to an attacker as vulnerabilities are the well-known and well understood flaws by the carelessness of developer of the software. For example buffer overflow and format string vulnerabilities are most common and well known class of vulnerabilities. In order to identify these vulnerabilities a comprehensive analysis is required to develop some standard solut...

Journal: :Praxis der Informationsverarbeitung und Kommunikation 2004
Shai Rubin Ian D. Alderman David W. Parter Mary K. Vernon

We propose an infrastructure that helps a system administrator to identify a newly published vulnerability on the site hosts and to evaluate the vulnerability’s threat with respect to the administrator’s security priorities. The infrastructure foundation is the vulnerability semantics, a small set of attributes for vulnerability definition. We demonstrate that with a few attributes it is possib...

2008
Will Dormann Dan Plakosh

Vulnerabilities in ActiveX controls are frequently used by attackers to compromise systems using the Microsoft Internet Explorer web browser. A programming or design flaw in an ActiveX control can allow arbitrary code execution as the result of viewing a specially-crafted web page. In this paper, we examine effective techniques for fuzz testing ActiveX controls, using the Dranzer tool developed...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید