Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions.
Biswaroop GuhaBiswanath MukherjeePublished in: INFOCOM (1996)
Keyphrases
- reverse engineering
- network security
- program understanding
- ip networks
- reverse engineer
- dynamic analysis
- intrusion detection
- software engineering
- traffic analysis
- legacy systems
- computer networks
- intrusion detection system
- software maintenance
- information security
- anomaly detection
- security policies
- network traffic
- object oriented
- dos attacks
- end to end
- risk assessment
- situation assessment
- anti phishing
- source code
- security breaches
- legacy software systems
- network administrators
- gene regulatory networks
- program slicing
- security protection
- tcp ip