2009
DOI: 10.1108/14779960911004499
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerabilities and responsibilities: dealing with monsters in computer security

Abstract: If you would like to write for this, or any other Emerald publication, then please use our Emerald for Authors service information about how to choose which publication to write for and submission guidelines are available for all. Please visit www.emeraldinsight.com/authors for more information. About Emerald www.emeraldinsight.comEmerald is a global publisher linking research and practice to the benefit of society. The company manages a portfolio of more than 290 journals and over 2,350 books and book series … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 33 publications
(32 reference statements)
0
4
0
Order By: Relevance
“…the Needham-Schroeder protocol; Lowe 1996 ). The issue is that we often fail to identify types of exceptional circumstances that have not yet caused security problems ( Pieters and Consoli 2009 ). Only when new types of issues become generally known do they become part of security verification and testing.…”
Section: Security Metrics and Testingmentioning
confidence: 99%
“…the Needham-Schroeder protocol; Lowe 1996 ). The issue is that we often fail to identify types of exceptional circumstances that have not yet caused security problems ( Pieters and Consoli 2009 ). Only when new types of issues become generally known do they become part of security verification and testing.…”
Section: Security Metrics and Testingmentioning
confidence: 99%
“…There are also discussions about the theoretical and computational science of exploit techniques and proposals to do explicit parsing and normalization of inputs [11,25,16,24]. Bratus et al [11] discuss "weird machines" and the view that the theoretical language aspects of computer science lie at the heart of practical computer security problems, especially exploitable vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…From a security-by-design point of view, one may search for known types of vulnerabilities, but it is hard to find the unknown ones, those that transcend existing (cultural) classification systems [4,6,34]. In such a context, complete design-time security may be impossible due to the limitations of human perception and imagination.…”
Section: Advantages Of the Paradigmmentioning
confidence: 99%