A Case Study in Detecting Software Security Vulnerabilities Using Constraint Optimization.
Michael WeberViren ShahChris RenPublished in: SCAM (2001)
Keyphrases
- security vulnerabilities
- constraint optimization
- intrusion detection
- dos attacks
- constraint satisfaction problems
- constraint satisfaction
- security properties
- constraint networks
- constraint programming
- penetration testing
- branch and bound search
- software architecture
- software development
- software systems
- lightweight
- anomaly detection
- unauthorized access
- search algorithm