The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

Categorization of Software Errors that led to Security Breaches

Wenliang Du and A. P. Mathur
Download: PDF
Added 2002-07-26

Vulnerability Testing of Software System Using Fault Injection

COAST TR 98-02
Wenliang Du and A. P. Mathur
Download: PDF
Added 2002-07-26

Incremental Mining of Partial Periodic Patterns in Time-Series Databases

CERIAS TR 2000-03
Mohamed G. Elfeky, and A. P. Mathur
Download: PDF
Added 2002-07-26

An Efficient Edge Extraction Technique Using Color Components and More Potential Patterns

CERIAS TR 2000-05
ianping Fan, and Walid G. Aref, A. Rezgui, Ahmed K. Elmagarmid
Download: PDF
Added 2002-07-26

A Toolkit for Modeling and Compressing Audit Data

COAST TR 98-20
J. Chapman Flack, Mikhail Atallah
Download: PDF
Added 2002-07-26

Monitoring File System Integrity on Unix Platforms

Gene Kim and E. H. Spafford
Added 2002-07-26

The Design and Implementation of Tripwire: A File System Integrity Checker

CSD-TR-93-071
Gene Kim and E. H. Spafford
Download: PDF
Added 2002-07-26

Experiences with Tripwire: Using Integrity Checkers for Intrusion Detection

Gene H. Kim and E. H. Spafford;
Download: PDF
Added 2002-07-26

Writing, Supporting, and Evaluating Tripwire: A Publically Available Security Tool

Gene H. Kim and E. H. Spafford
Download: PDF
Added 2002-07-26

Authorship Analysis: Identifying the Author of a Program

CSD-TR-96-052
Ivan Krsul and Eugene H. Spafford
Download: PDF
Added 2002-07-26


Computer Vulnerability Analysis

COAST TR 98-07
Ivan Krsul, E. H. Spafford and Mahesh V. Tripunitara
Download: PDF
Added 2002-07-26

COAST Vulnerability Database User's Manual

COAST TR 98-08
Ivan Krsul
Download: PDF
Added 2002-07-26

Software Vulnerability Analysis

COAST TR 98-09
Ivan Krsul
Download: PDF

The consequences of a class of system failures, commonly known as software vulnerabilities, violate security policies.  They can cause the loss of information and reduce the value or usefulness of the system. An increased understanding of the nature of vulnerabilities, their manifestations, and the mechanisms that can be used to eliminate and prevent them can be achieved by the development of a unified definition of software vulnerabilities, the development of a framework for the creation of taxonomies for vulnerabilites, and the application of learning, visualization, and statistical tools on a representative collection of software vulnerabilities. This dissertation provides a unifying definition of software vulnerability based on the notion that it is securty policies that define what is allowable or desirable in a system.  It also includes a framework for the development of classifications and taxonomies for software vulnerabilities. This dissertation presents a classification of software vulnerabilities that focuses n the assumptions that programmers make regarding the environment in which their application will be executed and that frequently do not hold during the execution of the program. This dissertation concludes by showing that the unifying definition of software vulnerability, the framweork for the development of classifications, and the application of learning and visulization tools can be used to improve security.

Added 2002-07-26

Report of the CMAD III - 3rd Annual Workshop on Computer Misuse and Anomaly Detection

COAST TR 95-01
Sandeep Kumar, Steven W. Lodin, and Christoph L. Schuba
Added 2002-07-26