Attack surface

Results: 63



#Item
41Address space layout randomization / Buffer overflow / Software engineering / Heap overflow / Systems engineering / Software bugs / Computing / Sophos

Sophail: Applied attacks against Sophos Antivirus Tavis Ormandy [removed] Abstract By design, antivirus products introduce a vast attack surface to a hostile environment. The vendors of these products have a r

Add to Reading List

Source URL: lock.cmpxchg8b.com

Language: English - Date: 2013-06-24 02:07:40
42NACA airfoil / Airfoil / Supercritical airfoil / Camber / Foil / Lift / National Advisory Committee for Aeronautics / Center of pressure / Angle of attack / Aerodynamics / Aerospace engineering / Fluid dynamics

Airfoil Technology The historical evolution of airfoil sections, [removed]The last two shapes are low-drag sections designed to have laminar flow over 60 to 70 percent of chord on both the upper and lower surface. Th

Add to Reading List

Source URL: crgis.ndc.nasa.gov

Language: English - Date: 2014-08-11 17:14:13
43Security / Hacking / Software testing / Domain name system / Radio-frequency identification / Verisign / Attack / Vulnerability / Computer security / Cyberwarfare / Computer network security

Abstract - Quantifying Systemic Dependencies Through Attack Surface Analysis

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-03-12 13:25:57
44Hacking / Software testing / Hardening / Cyberwarfare / Plugtest / Attack surface / Vulnerability / Computing / Computer security / BIOS / Unified Extensible Firmware Interface

presented by Hardening The Attack Surface UEFI Winter Plugfest – February 21-23, 2012 Presented by

Add to Reading List

Source URL: www.uefi.org

Language: English - Date: 2013-09-24 15:21:10
45Computing / Application security / Attack surface / Threat model / Vulnerability / Secure coding / Fuzz testing / Computer security / Cyberwarfare / Software testing

presented by Hardening the UEFI Attack Surface Updated[removed]

Add to Reading List

Source URL: www.uefi.org

Language: English - Date: 2013-09-24 15:13:25
46Internet protocols / Cryptographic protocols / Internet standards / Domain Name System Security Extensions / X.509 / Certificate authority / Public key certificate / Online Certificate Status Protocol / Transport Layer Security / Cryptography / Public-key cryptography / Key management

REDUCING THE X.509 ATTACK SURFACE WITH DNSSEC’S DANE MARCH[removed]VerisignInc.com

Add to Reading List

Source URL: www.verisigninc.com

Language: English - Date: 2012-03-28 13:55:02
47Portable software / Web browsers / Pwn2Own / Sandbox / Attack surface / Software / Google Chrome / Cloud clients

Public EXTERNAL Polishing Chrome for Fun and Profit Nils & Jon

Add to Reading List

Source URL: labs.mwrinfosecurity.com

Language: English - Date: 2014-09-02 08:45:28
48Security / Computer network security / Hacking / Software testing / Attack surface / Vulnerability / Buffer overflow / RSA / Stack / Computer security / Cyberwarfare / Electronic commerce

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. XX, NO. X, MONTH[removed]An Attack Surface Metric Pratyusa K. Manadhata, Member, IEEE, and Jeannette M. Wing, Fellow, IEEE

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2010-05-13 19:55:15
49Security / Vulnerability / Attack surface / Attack / Computer security / Cyberwarfare / Computer network security

An Attack Surface Metric Pratyusa K. Manadhata and Jeannette M. Wing Carnegie Mellon University {pratyus, wing}@cs.cmu.edu 1

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2006-09-11 11:24:13
50Computer network security / Hacking / Software testing / Attack surface / Vulnerability / Exploit / Buffer overflow / Application security / SAP AG / Computer security / Cyberwarfare / Computing

Measuring the Attack Surfaces of SAP Business Applications Pratyusa K. Manadhata1 Yuecel Karabulut2 Jeannette M. Wing1 May 2008

Add to Reading List

Source URL: reports-archive.adm.cs.cmu.edu

Language: English - Date: 2008-06-13 18:01:26
UPDATE