Security threats, countermeasures, and challenges of digital supply chains
The rapid growth of Information Communication Technologies (ICT) has impacted many
fields. In this context, the supply chain has also quickly evolved toward the digital supply …
fields. In this context, the supply chain has also quickly evolved toward the digital supply …
A survey of moving target defenses for network security
Network defenses based on traditional tools, techniques, and procedures (TTP) fail to
account for the attacker's inherent advantage present due to the static nature of network …
account for the attacker's inherent advantage present due to the static nature of network …
An empirical study of oss-fuzz bugs
ZY Ding, C Le Goues - 2021 IEEE/ACM 18th International …, 2021 - ieeexplore.ieee.org
Continuous fuzzing is an increasingly popular technique for automated quality and security
assurance. Google maintains OSS-Fuzz: a continuous fuzzing service for open source …
assurance. Google maintains OSS-Fuzz: a continuous fuzzing service for open source …
A honeypot-driven cyber incident monitor: lessons learned and steps ahead
In recent years, the amount and the sophistication of cyber attacks has increased
significantly. This creates a plethora of challenges from a security perspective. First, for the …
significantly. This creates a plethora of challenges from a security perspective. First, for the …
The human side of fuzzing: Challenges faced by developers during fuzzing activities
Fuzz testing, also known as fuzzing, is a software testing technique aimed at identifying
software vulnerabilities. In recent decades, fuzzing has gained increasing popularity in the …
software vulnerabilities. In recent decades, fuzzing has gained increasing popularity in the …
A hierarchical model for quantifying software security based on static analysis alerts and software metrics
Despite the acknowledged importance of quantitative security assessment in secure
software development, current literature still lacks an efficient model for measuring internal …
software development, current literature still lacks an efficient model for measuring internal …
MultiTLS: using multiple and diverse ciphers for stronger secure channels
Computer communication is at the foundation of how the modern world works, connecting
people and machines over public infrastructure. For this reason, communication is exposed …
people and machines over public infrastructure. For this reason, communication is exposed …
Deployment of source address validation by network operators: a randomized control trial
IP spoofing, sending IP packets with a false source IP address, continues to be a primary
attack vector for large-scale Denial of Service attacks. To combat spoofing, various …
attack vector for large-scale Denial of Service attacks. To combat spoofing, various …
The extent of orphan vulnerabilities from code reuse in open source software
D Reid, M Jahanshahi, A Mockus - Proceedings of the 44th International …, 2022 - dl.acm.org
Motivation: A key premise of open source software is the ability to copy code to other open
source projects (white-box reuse). Such copying accelerates development of new projects …
source projects (white-box reuse). Such copying accelerates development of new projects …
[图书][B] Security and Privacy Vision in 6G: A Comprehensive Guide
P Porambage, M Liyanage - 2023 - books.google.com
SECURITY AND PRIVACY VISION IN 6G Prepare for the future of mobile communication
with this comprehensive study 6G is the next frontier in mobile communication, with …
with this comprehensive study 6G is the next frontier in mobile communication, with …