Windows of Vulnerability: A Case Study Analysis

@article{Arbaugh2000WindowsOV,
  title={Windows of Vulnerability: A Case Study Analysis},
  author={William A. Arbaugh and William L. Fithen and John McHugh},
  journal={IEEE Computer},
  year={2000},
  volume={33},
  pages={52-59}
}
52 Computer Windows of Vulnerability: A Case Study Analysis C omplex information and communication systems give rise to design, implementation, and management errors. These errors can lead to a vulnerability—a flaw in an information technology product that could allow violations of security policy. Anecdotal evidence alone suggests that known and patchable vulnerabilities cause the majority of system intrusions. Although no empirical study has substantiated this anecdotal evidence, none has… CONTINUE READING
Highly Cited
This paper has 262 citations. REVIEW CITATIONS
Recent Discussions
This paper has been referenced on Twitter 1 time over the past 90 days. VIEW TWEETS
165 Citations
10 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-10 of 165 extracted citations

262 Citations

02040'01'04'08'12'16
Citations per Year
Semantic Scholar estimates that this publication has 262 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 10 references

Closing the Window of Exposure: Reflections on the Future of Security

  • B Schneier
  • Securityfocus.com
  • 2000

Attention: Please Update Your Imapd, " pine-announce

  • T Gray
  • Attention: Please Update Your Imapd, " pine…
  • 1998

Bugtraq, http://www. securityfocus.com/archive/1/9929. 11. CERT Coordination Center, CERT Advisory CA-1998- .09.imapd: " Buffer Overflow in Some Implementations of IMAP Servers

  • Anonymous
  • EMERGENCY: New Remote Root Exploit in UW imapd…
  • 1998

An Analysis of Security Incidents on the Internet Engineering and Public Policy

  • J D Howard
  • An Analysis of Security Incidents on the Internet…
  • 1997

Vulnerability in IMAP and POP

  • Cert Coordination Center, Cert Advisory, Ca
  • Vulnerability in IMAP and POP
  • 1997

imapd and ipop3d hole

  • D Sacerdote
  • imapd and ipop3d hole
  • 1997

CGI Security: Escape Newlines

  • J Myers
  • Bugtraq
  • 1996

Information Security: Computer Attacks at Department of Defense Pose Increasing Risks

  • Government Accounting Office
  • 1996

RFC206—Internet Message Protocol " — version 4, revision 1, Internet Engineering Task Force

  • M Crispin
  • RFC206—Internet Message Protocol " — version 4…
  • 1996

Similar Papers

Loading similar papers…