Security threats, countermeasures, and challenges of digital supply chains

B Hammi, S Zeadally, J Nebhen - ACM Computing Surveys, 2023 - dl.acm.org
The rapid growth of Information Communication Technologies (ICT) has impacted many
fields. In this context, the supply chain has also quickly evolved toward the digital supply …

A survey of moving target defenses for network security

S Sengupta, A Chowdhary, A Sabur… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Network defenses based on traditional tools, techniques, and procedures (TTP) fail to
account for the attacker's inherent advantage present due to the static nature of network …

An empirical study of oss-fuzz bugs

ZY Ding, C Le Goues - 2021 IEEE/ACM 18th International …, 2021 - ieeexplore.ieee.org
Continuous fuzzing is an increasingly popular technique for automated quality and security
assurance. Google maintains OSS-Fuzz: a continuous fuzzing service for open source …

A honeypot-driven cyber incident monitor: lessons learned and steps ahead

E Vasilomanolakis, S Karuppayah, P Kikiras… - Proceedings of the 8th …, 2015 - dl.acm.org
In recent years, the amount and the sophistication of cyber attacks has increased
significantly. This creates a plethora of challenges from a security perspective. First, for the …

The human side of fuzzing: Challenges faced by developers during fuzzing activities

O Nourry, Y Kashiwa, B Lin, G Bavota… - ACM Transactions on …, 2023 - dl.acm.org
Fuzz testing, also known as fuzzing, is a software testing technique aimed at identifying
software vulnerabilities. In recent decades, fuzzing has gained increasing popularity in the …

A hierarchical model for quantifying software security based on static analysis alerts and software metrics

M Siavvas, D Kehagias, D Tzovaras, E Gelenbe - Software Quality Journal, 2021 - Springer
Despite the acknowledged importance of quantitative security assessment in secure
software development, current literature still lacks an efficient model for measuring internal …

MultiTLS: using multiple and diverse ciphers for stronger secure channels

R Moura, R Lopes, DR Matos, ML Pardal… - Computers & Security, 2023 - Elsevier
Computer communication is at the foundation of how the modern world works, connecting
people and machines over public infrastructure. For this reason, communication is exposed …

Deployment of source address validation by network operators: a randomized control trial

Q Lone, A Frik, M Luckie, M Korczyński… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
IP spoofing, sending IP packets with a false source IP address, continues to be a primary
attack vector for large-scale Denial of Service attacks. To combat spoofing, various …

The extent of orphan vulnerabilities from code reuse in open source software

D Reid, M Jahanshahi, A Mockus - Proceedings of the 44th International …, 2022 - dl.acm.org
Motivation: A key premise of open source software is the ability to copy code to other open
source projects (white-box reuse). Such copying accelerates development of new projects …

[图书][B] Security and Privacy Vision in 6G: A Comprehensive Guide

P Porambage, M Liyanage - 2023 - books.google.com
SECURITY AND PRIVACY VISION IN 6G Prepare for the future of mobile communication
with this comprehensive study 6G is the next frontier in mobile communication, with …