Attack patterns

Results: 58



#Item
51Cyberwarfare / Computer network security / Computing / Attack patterns / Vulnerability / Attack / Sequence container / Exploit / Mitre Corporation / Hacking / Software testing / Computer security

Common Attack Pattern Enumeration and Classification (CAPEC™) Schema Description Version 2.5 Schema Element Name Description

Add to Reading List

Source URL: capec.mitre.org

Language: English - Date: 2013-06-17 16:53:46
52Software testing / Software bugs / Hacking / Source code / Vulnerability / Attack patterns / Application security / Cross-site scripting / Code injection / Cyberwarfare / Computer security / Computing

Microsoft Word - tcm_taxonomy_submission.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:23
53Software testing / Hacking / Relational database management systems / Database management systems / Attack patterns / SQL injection / Vulnerability / Code injection / Buffer overflow / Cyberwarfare / Computing / Computer security

CWE[removed]CWE/SANS Top 25 Most Dangerous Software Errors

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2012-09-25 15:14:33
54Computer network security / Software testing / Hacking / Software bugs / Attack patterns / Vulnerability / CWE / Common Weakness Enumeration / Software assurance / Cyberwarfare / Computer security / Computing

Software Assurance Pocket Guide Series: Development, Volume II Version 2.3, November 1, 2012 Software Assurance (SwA) Pocket Guide Resources This is a resource for ‘getting started’ in selecting and adopting releva

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2012-11-01 17:01:27
55RC4 / Distinguishing attack / Weak key / Keystream / Cryptology ePrint Archive / Cipher / Fluhrer /  Mantin and Shamir attack / Py / Cryptography / Stream ciphers / Pseudorandom number generators

1(4) The Perils of Repeating Patterns: Observation of Some Weak Keys in RC4 Joachim Strömbergson1, Simon Josefsson2 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-04-29 06:53:59
56Computing / Object-oriented programming / Method / Software design patterns / C++ classes / Copy constructor / Reference / Constant / Clone / Computer programming / Software engineering / C++

Tutorial Corner: Attack of the Clones Tutorial Corner: Attack of the Clones Today I saw a newsgroup posting that asked the following question: “What is the exact purpose of the clone() function? After all, it merely ge

Add to Reading List

Source URL: www.semantics.org

Language: English - Date: 2013-04-08 13:05:08
57Software engineering / Crime prevention / National security / Hacking / Software testing / Attack patterns / Software design pattern / Vulnerability / Security engineering / Security / Design / Cyberwarfare

PDF Document

Add to Reading List

Source URL: www.nii.ac.jp

Language: English - Date: 2008-04-01 22:41:21
58Computer network security / Data management / SQL / SQL injection / Imperva / Remote file inclusion / Denial-of-service attack / Attack patterns / Cross-site scripting / Computer security / Cyberwarfare / Computing

PDF Document

Add to Reading List

Source URL: www.imperva.com

Language: English - Date: 2013-07-22 19:07:16
UPDATE