Proceedings of the 2017 VI International Conference on Network, Communication and Computing 2017
DOI: 10.1145/3171592.3171622
|View full text |Cite
|
Sign up to set email alerts
|

Applying Binary Patch Comparison to Cisco IOS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 1 publication
0
1
0
Order By: Relevance
“…Software manufacturers do not generally indicate the exact locations and possible causes of vulnerabilities in their security announcements while releasing a patch file. By comparing the differences between the post-patched file and its pre-patched version, it is not difficult to locate the vulnerabilities [11], [12]. However, the technique of binary comparison is not suitable for finding undiscovered vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…Software manufacturers do not generally indicate the exact locations and possible causes of vulnerabilities in their security announcements while releasing a patch file. By comparing the differences between the post-patched file and its pre-patched version, it is not difficult to locate the vulnerabilities [11], [12]. However, the technique of binary comparison is not suitable for finding undiscovered vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%