Protocol Vulnerability Analysis

@inproceedings{Whalen2005ProtocolVA,
  title={Protocol Vulnerability Analysis},
  author={Sean Whalen and Matt Bishop and Sophie Engle},
  year={2005}
}
Network protocols continue to suffer from well documented vulnerabilities. Despite this, a practical methodology for classifying these vulnerabilities does not exist. In this paper, we present such a methodology. We have developed a grammar for expressing network protocol exploits in terms of vulnerabilities and symptoms. Vulnerabilities are defined by characteristics, conditions which must hold for a vulnerability to exist. Symptoms are the violations of policy enabled by vulnerabilities… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

References

Publications referenced by this paper.
Showing 1-10 of 20 references

A Functional Method for Assessing Protocol Implementation Security

R. Kaksonen
Technical Research Centre of Finland, • 2002
View 2 Excerpts

Vulnerability Analysis

M. Bishop
Proc. 2nd International Symposium on Recent Advances in Intrusion Detection, • 1999
View 2 Excerpts

The NRL Protocol Analyzer: An Overview

J. Log. Program. • 1996
View 1 Excerpt

Use of a Taxonomy of Security Faults

T. Aslam, I. Krsul, E. Spafford
Proc. 19th National Information Systems Security Conference, • 1996
View 1 Excerpt

Similar Papers

Loading similar papers…