Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 55 results for the vulnerability analysis Type - White Paper

White Paper | December 2017 - White Paper Embedded Device Vulnerability Analysis Case Study Using ... By Madison Oliver, Kyle O'Meara

This document provides security researchers with a repeatable methodology to produce more thorough and actionable results when analyzing embedded devices for vulnerabilities.

White Paper | December 2005 - White Paper Botnets as a Vehicle for Online Crime By Nicholas Ianelli, Aaron Hackworth

In this paper, the authors describe the capabilities present in bot malware and the motivations for operating botnets.

White Paper | April 1997 - White Paper An Analysis of Security Incidents on the Internet By John Howard, George Weaver

In this dissertation, John D. Howard reviews an analysis of security incidents on the Internet from between 1989 and 1995.

White Paper | July 2015 - White Paper CND Equities Strategy By Jonathan Spring, Ed Stoner

In this paper, the authors discuss strategies for successful computer network defense (CND) based on considering the adversaries' responses.

White Paper | October 2001 - White Paper 2001 Tech Tip: Managing the Threat of Denial-of-Service ... By Allen D. Householder, Art Manion, Linda Pesante

In this 2001 paper, the authors describe the then-current situation regarding denial-of-service (DOS) attacks and ways of addressing the problem.

White Paper | August 2014 - White Paper Abuse of Customer Premise Equipment and Recommended ... By Paul Vixie, Chris Hallenbeck, Jonathan Spring

In this paper, the authors provide recommendations for addressing problems related to poor management of Consumer Premise Equipment (CPE).

White Paper | February 2010 - White Paper 0-knowledge fuzzing By Vincenzo Iozzo (Zynamics)

In this paper, Vincenzo Iozzo presents how to effectively fuzz with no knowledge of the user-input and the binary.

White Paper | January 2008 - White Paper Vulnerability Detection in ActiveX Controls through Automated ... By Will Dormann, Daniel Plakosh

In this 2008 paper, the authors explore results of a test of a large number of Active X controls, which provides insight into the current state of ActiveX security.

White Paper | October 2001 - White Paper 2001 Tech Tip: Trends in Denial of Service Attack Technology By Kevin Houle, George Weaver

In this 2001 paper, the authors highlight trends in the deployment, use, and impact of DoS attack technology based on intruder activity and attack tools.

White Paper | July 2015 - White Paper Comments on Bureau of Industry and Security (BIS) Proposed ... By Allen D. Householder, Art Manion

In this paper, CERT researchers comment on the proposed rule, Wassenaar Arrangement 2013 Plenary Agreements Implementation: Intrusion and Surveillance Items.