Protocol Vulnerability Analysis

  title={Protocol Vulnerability Analysis},
  author={Sean Whalen and Matt Bishop and Sophie Engle},
Network protocols continue to suffer from well documented vulnerabilities. Despite this, a practical methodology for classifying these vulnerabilities does not exist. In this paper, we present such a methodology. We have developed a grammar for expressing network protocol exploits in terms of vulnerabilities and symptoms. Vulnerabilities are defined by characteristics, conditions which must hold for a vulnerability to exist. Symptoms are the violations of policy enabled by vulnerabilities… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.


Publications referenced by this paper.
Showing 1-10 of 20 references

A Functional Method for Assessing Protocol Implementation Security

R. Kaksonen
Technical Research Centre of Finland, • 2002
View 2 Excerpts

Vulnerability Analysis

M. Bishop
Proc. 2nd International Symposium on Recent Advances in Intrusion Detection, • 1999
View 2 Excerpts

The NRL Protocol Analyzer: An Overview

J. Log. Program. • 1996
View 1 Excerpt

Use of a Taxonomy of Security Faults

T. Aslam, I. Krsul, E. Spafford
Proc. 19th National Information Systems Security Conference, • 1996
View 1 Excerpt

Similar Papers

Loading similar papers…