咨询与建议

限定检索结果

文献类型

  • 2 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 2 篇 信息与通信工程
    • 2 篇 计算机科学与技术...
    • 1 篇 电气工程
    • 1 篇 软件工程
  • 1 篇 管理学
    • 1 篇 工商管理

主题

  • 3 篇 code exploits
  • 2 篇 fuzzy logic
  • 2 篇 software vulnera...
  • 2 篇 source code clas...
  • 2 篇 tainted object p...
  • 1 篇 fault analysis
  • 1 篇 software vulnera...
  • 1 篇 software securit...
  • 1 篇 preventative mai...

机构

  • 1 篇 athens univ econ...
  • 1 篇 univ idaho dept ...
  • 1 篇 aristotle univ t...
  • 1 篇 aristotle univ t...
  • 1 篇 aueb dept inform...

作者

  • 2 篇 katsaros panagio...
  • 2 篇 stergiopoulos ge...
  • 2 篇 gritzalis dimitr...
  • 1 篇 petsanas panagio...
  • 1 篇 hanebutte n
  • 1 篇 oman pw

语言

  • 3 篇 英文
检索条件"主题词=Code Exploits"
3 条 记 录,以下是1-10 订阅
排序:
Software vulnerability mitigation as a proper subset of software maintenance
收藏 引用
JOURNAL OF SOFTWARE MAINTENANCE AND EVOLUTION-RESEARCH AND PRACTICE 2005年 第6期17卷 379-400页
作者: Hanebutte, N Oman, PW Univ Idaho Dept Comp Sci Moscow ID 83844 USA
Through the rise of the Internet and Web-based software our computing environment has evolved from well-defined topologies into loosely organized, unbounded topologies where user profiles and intentions are largely un... 详细信息
来源: 评论
Automated Exploit Detection using Path Profiling The Disposition Should Matter, Not the Position  12
Automated Exploit Detection using Path Profiling <i>The Disp...
收藏 引用
12th International Joint Conference on E-Business and Telecommunications (ICETE)
作者: Stergiopoulos, George Petsanas, Panagiotis Katsaros, Panagiotis Gritzalis, Dimitris Athens Univ Econ & Business Dept Informat Informat Secur & Crit Infrastruct Protect INFOSEC Athens Greece Aristotle Univ Thessaloniki Dept Informat Thessaloniki Greece
Recent advances in static and dynamic program analysis resulted in tools capable to detect various types of security bugs in the Applications under Test (AUT). However, any such analysis is designed for a priori speci... 详细信息
来源: 评论
Execution Path Classification for Vulnerability Analysis and Detection  1
收藏 引用
12th International Joint Conference on E-Business and Telecommunications (ICETE)
作者: Stergiopoulos, George Katsaros, Panagiotis Gritzalis, Dimitris AUEB Dept Informat Informat Secur & Crit Infrastruct Protect INFOSEC Athens Greece Aristotle Univ Thessaloniki Dept Informat GR-54006 Thessaloniki Greece
Various commercial and open-source tools exist, developed both by the industry and academic groups, which are able to detect various types of security bugs in applications' source code. However, most of these tool... 详细信息
来源: 评论