Showing 1 - 10 of 55 results for the vulnerability analysis Type - White Paper
This document provides security researchers with a repeatable methodology to produce more thorough and actionable results when analyzing embedded devices for vulnerabilities.
In this paper, the authors describe the capabilities present in bot malware and the motivations for operating botnets.
In this dissertation, John D. Howard reviews an analysis of security incidents on the Internet from between 1989 and 1995.
In this paper, the authors discuss strategies for successful computer network defense (CND) based on considering the adversaries' responses.
In this paper, the authors provide recommendations for addressing problems related to poor management of Consumer Premise Equipment (CPE).
In this 2001 paper, the authors describe the then-current situation regarding denial-of-service (DOS) attacks and ways of addressing the problem.
In this paper, Vincenzo Iozzo describes how to effectively fuzz with no knowledge of the user-input and the binary.
In this paper, CERT researchers comment on the proposed rule, Wassenaar Arrangement 2013 Plenary Agreements Implementation: Intrusion and Surveillance Items.
In this 2008 paper, the authors explore results of a test of a large number of Active X controls, which provides insight into the current state of ActiveX security.
In this 2001 paper, the authors highlight trends in the deployment, use, and impact of DoS attack technology based on intruder activity and attack tools.