Title
Detecting overflow vulnerabilities using automated verification
Abstract
Maintaining the security of our computer systems has become one of the dominant aspects of the war on terror and many researchers and developers predict that the next attack against the United States will be a computer attack [5, 9, 11]. The Department of Homeland Security has established a partnership with industry, the United States Computer Readiness Team (US-CERT), to protect the nation's Internet infrastructure [2]. The US-CERT sponsors an automated, web-based repository of standards based vulnerability data (NVD), which includes a database of security related software flaws [3].
Year
DOI
Venue
2009
10.1145/1558607.1558633
CSIIRW
Keywords
Field
DocType
united states,dominant aspect,next attack,computer system,computer attack,united states computer readiness,vulnerability data,homeland security,automated verification,detecting overflow,software flaw,internet infrastructure,reinforcement learning
Homeland security,World Wide Web,Computer science,Computer security,Software,General partnership,Computer security model,Vulnerability,Reinforcement learning,The Internet
Conference
Citations 
PageRank 
References 
0
0.34
3
Authors
3
Name
Order
Citations
PageRank
Brian A. Malloy130030.58
Murali Sitaraman227040.99
Jason O. Hallstrom326240.55