Showing 1 - 10 of 120 results for the Vulnerability Analysis
This presentation describes initial research conducted by CERT and Carnegie Mellon to determine if malware report databases were amenable to automated processing to identify flaws
In this dissertation, John D. Howard reviews an analysis of security incidents on the Internet from between 1989 and 1995.
This presentation introduces the survivable network analysis method, developed by the Software Engineering Institute's (SEI) CERT/Coordination Center.
This report presents an approach to analyzing approximately 16 gigabytes of full packet capture data collected from an industrial control system honeynet—a network of seemingly vulnerable machines designed to lure attackers.
This 2006 CERT presentation provides an overview of the vulnerability discovery field and discusses how it can be used to improve the practice of security engineering.
This report describes a test framework that the CERT/CC developed to identify systemic and other vulnerabilities in CPE routers.
In this talk, we will trace the origin and evolution of a physical-world vulnerability that dates to the late 19th century, and explore whether
This presentation explores the expanding landscape of vulnerabilities that accompanies the increasing reliance on software and then examines some key steps to help mitigate the increased risk.
In this paper, the authors describe the capabilities present in bot malware and the motivations for operating botnets.
In this 2005 report, the authors propose a classification scheme that uses attribute-value pairs to provide a multidimensional view of vulnerabilities.