Showing 1 - 10 of 124 results for Vulnerability Analysis
This document provides security researchers with a repeatable methodology to produce more thorough and actionable results when analyzing embedded devices for vulnerabilities.
Will Dormann discusses a tool that shows whether a connection to the web is secure and what information is being transmitted.
This presentation describes initial research conducted by CERT and Carnegie Mellon to determine if malware report databases were amenable to automated processing to identify flaws
Poster on research to create a method to automatically classify and prioritize alterts
This presentation introduces the survivable network analysis method, developed by the Software Engineering Institute's (SEI) CERT/Coordination Center.
In this dissertation, John D. Howard reviews an analysis of security incidents on the Internet from between 1989 and 1995.
This report presents an approach to analyzing approximately 16 gigabytes of full packet capture data collected from an industrial control system honeynet—a network of seemingly vulnerable machines designed to lure attackers.
This 2006 CERT presentation provides an overview of the vulnerability discovery field and discusses how it can be used to improve the practice of security engineering.
Art Manion and Allen Householder of the CERT Vulnerability Analysis team, talk about threat modeling and its use in improving the security of the Internet of Things (IoT).
The CERT/CC has pioneered the Coordinated Vulnerability Disclosure (CVD) process. In the past year, they analyzed their case tracking data, focusing on the distribution of case workloads over time. This slide deck contains findings from this analysis.