Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners.
Andrea ValenzaGabriele CostaAlessandro ArmandoPublished in: RAID (2020)
Keyphrases
- information security
- security vulnerabilities
- security issues
- security mechanisms
- attack scenarios
- security services
- security risks
- security breaches
- intrusion detection
- security patterns
- trust management
- denial of service
- trusted computing
- security threats
- security requirements
- security problems
- privacy concerns
- policy enforcement
- trust relationships
- enterprise network
- trust model
- dos attacks
- network security
- smart card
- information systems
- trust negotiation
- countermeasures
- security management
- trust evaluation
- access control
- cyber attacks
- buffer overflow
- public key infrastructure
- security protocols
- computer security
- security properties
- security policies
- range data
- key management
- statistical databases
- intrusion detection system
- range images
- computer systems
- security flaws