Taxonomies of attacks and vulnerabilities in computer systems

VM Igure, RD Williams - IEEE Communications Surveys & …, 2008 - ieeexplore.ieee.org
Security assessment of a system is a difficult problem. Most of the current efforts in security
assessment involve searching for known vulnerabilities. Finding unknown vulnerabilities still …

[PDF][PDF] A graph-based system for network-vulnerability analysis

C Phillips, LP Swiler - Proceedings of the 1998 workshop on New …, 1998 - dl.acm.org
This paper presents a graph-based approach to network vulnerability analysis. The method
is flexible, allowing analysis of attacks from both outside and inside the network. It can …

A survey and taxonomy aimed at the detection and measurement of covert channels

B Carrara, C Adams - Proceedings of the 4th ACM Workshop on …, 2016 - dl.acm.org
New viewpoints of covert channels are presented in this work. First, the origin of covert
channels is traced back to acc ess control and a new class of covert channel, air-gap covert …

Using component metacontent to support the regression testing of component-based software

A Orso, MJ Harrold, D Rosenblum… - Proceedings IEEE …, 2001 - ieeexplore.ieee.org
Component based software technologies are viewed as essential for creating the software
systems of the future. However, the use of externally-provided components has serious …

Component metadata for software engineering tasks

A Orso, M Jean, D Rosenblum - … Workshop, EDO 2000 Davis, CA, USA …, 2001 - Springer
This paper presents a framework that lets a component de-veloper provide a component
user with different kinds of information, depending on the specific context and needs. The …

On acoustic covert channels between air-gapped systems

B Carrara, C Adams - Foundations and Practice of Security: 7th …, 2015 - Springer
In this work, we study the ability for malware to leak sensitive information from an air-gapped
high-security system to systems on a low-security network, using ultrasonic and audible …

Towards sustainable in-situ server systems in the big data era

C Li, Y Hu, L Liu, J Gu, M Song, X Liang… - Acm Sigarch Computer …, 2015 - dl.acm.org
Recent years have seen an explosion of data volumes from a myriad of distributed sources
such as ubiquitous cameras and various sensors. The challenges of analyzing these …

Identifying and classifying processes (traditional and soft factors) that support COTS component selection: a case study

D Kunda, L Brooks - European Journal of Information Systems, 2000 - Taylor & Francis
Abstract COTS-Based Systems (CBS) development focuses on building large software
systems by integrating previously existing software components. CBS success depends on …

[책][B] The ROI from software quality

K El Emam - 2005 - taylorfrancis.com
The ROI from Software Quality provides the tools needed for software engineers and project
managers to calculate how much they should invest in quality, what benefits the investment …

A software product line reference architecture for security

TE Fægri, S Hallsteinsen - Software Product Lines, 2006 - Springer
Security is a cross-cutting concern in software intensive systems and should consequently
be subject to careful architectural analysis and decision making. The requirements for …