2020 IEEE Secure Development (SecDev) 2020
DOI: 10.1109/secdev45635.2020.00027
|View full text |Cite
|
Sign up to set email alerts
|

Network Attack Surface Simplification for Red and Blue Teams

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Penetration testing is a vulnerability hunt from a threat's perspective [23]. A major advantage of pen testing is that a tester can create a proof of concept that proves a vulnerability exists.…”
Section: B Determining Susceptibility With Penetration Testingmentioning
confidence: 99%
See 1 more Smart Citation
“…Penetration testing is a vulnerability hunt from a threat's perspective [23]. A major advantage of pen testing is that a tester can create a proof of concept that proves a vulnerability exists.…”
Section: B Determining Susceptibility With Penetration Testingmentioning
confidence: 99%
“…V. CONCLUSION Traditionally, a web attack surface has been the listening ports exposed to a threat [23]. A vulnerability like log4shell expands the attack surface for knowledgeable threat actors.…”
Section: Proof Of Conceptmentioning
confidence: 99%