An Attack Simulator for Systematically Testing Program-based Security Mechanisms.
Ben BreechMike TegtmeyerLori L. PollockPublished in: ISSRE (2006)
Keyphrases
- security mechanisms
- security measures
- resource constrained
- test cases
- smart card
- security issues
- access control
- cyber attacks
- security systems
- security requirements
- security problems
- operating system
- digital signature
- countermeasures
- security protocols
- security services
- security threats
- secret key
- information security
- payment systems
- cryptographic algorithms
- low cost
- cyber security
- software engineering
- multi agent systems