Policy-based Multihost Multistage Vulnerability Analysis ∗

  title={Policy-based Multihost Multistage Vulnerability Analysis ∗},
  author={Xinming Ou and Sudhakar Govindavajhala and Andrew W. Appel}
To determine the security impact software vulnerabilities have on a particular network, one must consider interactions among multiple components of the operating systems and multiple hosts. For a vulnerability analysis tool to be useful in practice, two features are crucial. First, the model used in the analysis must be able to automatically integrate formal vulnerability specifications from the bug-reporting community. Second, the analysis must be able to scale to networks with thousands of… CONTINUE READING


Publications citing this paper.
Showing 1-2 of 2 extracted citations

Study of generating attack graph based on privilege escalation for computer networks

2008 11th IEEE Singapore International Conference on Communication Systems • 2008
View 1 Excerpt


Publications referenced by this paper.
Showing 1-10 of 32 references

Introduction to OVAL: A new language to determine the presence of software vulnerabilities

Matthew Wojcik, Tiffany Bergeron, Todd Wittbold, Robert Roberge
http://oval.mitre.org/documents/docs- 03/intro/intro.html, • 2003
View 3 Excerpts
Highly Influenced

Fithen , Shawn V . Hernan , Paul F . O ’ Rourke , and David A . Shinberg . Formal modeling of vulnerabilities

D Joshua
Bell Labs technical journal • 2004

Similar Papers

Loading similar papers…