2000
DOI: 10.21236/ada386666
|View full text |Cite
|
Sign up to set email alerts
|

Quantifying Minimum-Time-To-Intrusion Based on Dynamic Software Safety Assessment

Abstract: Public reporting burden for this collection ol information is estimated to average 1 hour per response, including the time lot reviewing instructions, searching existing data sources, gathering and maintaining the data needett and completing and reviewing the collection of information. This report presents an overview of the results of a three year DARPA-sponsored effort investigating dynamic software security analysis. This research effort resulted in the design and implementation of two major tool sets (FIST… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…Specifically, it was theori/^ed in [11] that fault injection can be used to find locations in source code where security-related vulnerabilities might exist. The idea is simple: perform fault injection in locations throughout the software source code, and then observe whether the program exhibits insecure or non-robust behavior.…”
Section: Developing More Survlvable Systemsmentioning
confidence: 99%
“…Specifically, it was theori/^ed in [11] that fault injection can be used to find locations in source code where security-related vulnerabilities might exist. The idea is simple: perform fault injection in locations throughout the software source code, and then observe whether the program exhibits insecure or non-robust behavior.…”
Section: Developing More Survlvable Systemsmentioning
confidence: 99%