Attack surface

The attack surface of a software environment is the sum of the different points (the "attack vectors") where an unauthorized user (the "attacker… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Information-centric networking (ICN) replaces the widely used host-centric networking paradigm in communication networks (e.g… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
2014
2014
Attack surface is a valuable metric that help administrators of enterprise networks to evaluate the risk and security of the… (More)
  • table 1
Is this relevant?
2014
2014
The sheer size of commodity operating system kernels makes them a prime target for local attackers aiming to escalate privileges… (More)
  • table 1
  • figure 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2012
Highly Cited
2012
In the permission-based security model (used e.g. in Android and Blackberry), applications can be granted more permissions than… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
Is this relevant?
2012
2012
A software system's attack surface metric measures the freedom of a potential attacker to influence the system's execution… (More)
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Measurement of software security is a long-standing challenge to the research community. At the same time, practical security… (More)
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Modern automobiles are pervasively computerized, and hence potentially vulnerable to attack. However, while previous research has… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Cloud computing is quickly becoming the platform of choice for many web services. Virtualization is the key underlying technology… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We propose a metric for determining whether one version of a system is more secure than another with respect to a fixed set of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2004
2004
We propose a metric to determine whether one version of a system is relatively more secure than another with respect to the… (More)
  • figure 1
  • table 1
  • table 2
Is this relevant?