Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,351,746 papers from all fields of science
Search
Sign In
Create Free Account
Attack surface
The attack surface of a software environment is the sum of the different points (the "attack vectors") where an unauthorized user (the "attacker…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
20 relations
ARM architecture
Attack Surface Analyzer
Browser security
Cloud storage
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities
Noam Moscovich
,
Ron Bitton
,
+5 authors
A. Shabtai
arXiv.org
2020
Corpus ID: 220280420
The existence of a security vulnerability in a system does not necessarily mean that it can be exploited. In this research, we…
Expand
2017
2017
vmOS: A virtualization-based, secure desktop system
Hongliang Liang
,
Mingyu Li
,
+4 authors
Yan Song
Computers & security
2017
Corpus ID: 32717674
2017
2017
Adapting with Honeypot Configurations to Detect Evolving Exploits
Marcus Gutierrez
,
Christopher Kiekintveld
Adaptive Agents and Multi-Agent Systems
2017
Corpus ID: 38071414
Honeypots are decoy cyberdefense systems placed in a network to entice malicious entities into attacking in order to waste…
Expand
2017
2017
Counteracting malicious faults in cryptographic circuits
I. Polian
,
F. Regazzoni
IEEE European Test Symposium
2017
Corpus ID: 8122365
In the area of testing, faults represent defects that occur during circuit manufacturing, or transient disturbances due to…
Expand
2016
2016
Context integrity measurement architecture: A privacy-preserving strategy for the era of ubiquitous computing
J. Morrison
Ubiquitous Computing, Electronics & Mobile…
2016
Corpus ID: 22840635
Context Integrity Measurement Architecture (CIMA) was inspired by risk assessments used by credit card companies. These…
Expand
2016
2016
Slinging MUD: Manufacturer usage descriptions: How the network can protect things
E. Lear
,
B. Weis
International Conference on Selected Topics in…
2016
Corpus ID: 6984746
Through the simplifying assumption that a Thing has a single use or a small number of intended uses, it is possible to reduce the…
Expand
2014
2014
An identity-based authentication protocol for sensor networks
M. Yang
,
A. Al-Anbuky
,
William Liu
International Conference on Intelligent Sensors…
2014
Corpus ID: 16353404
We proposed an identity-based symmetric key authentication protocol using the Multiple-Key Blom's key agreement scheme as the…
Expand
2013
2013
TSB: Trusted sensing base for the power grid
A. Mazloomzadeh
,
O. Mohammed
,
S. Zonouz
IEEE International Conference on Smart Grid…
2013
Corpus ID: 3595759
To protect large-scale power-grid critical infrastructures, efficient security and intrusion prevention techniques are required…
Expand
2012
2012
ANALYSIS OF SOLID PARTICLE SURFACE IMPACT BEHAVIOR IN TURBOMACHINES TO ASSESS BLADE EROSION AND FOULING
K. Brun
,
Marybeth G. Nored
,
R. Kurz
2012
Corpus ID: 15757013
Solid particle admission is one of the principal damage and failure mechanisms in turbomachines such as gas turbines, axial, and…
Expand
2009
2009
IS THERE A LAWYER IN THE LAB
J. Malcho
2009
Corpus ID: 55213366
With the broadening possibilities and the ever-growing number of computer users, many applications are being developed that have…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE