Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners.
Andrea ValenzaGabriele CostaAlessandro ArmandoPublished in: CoRR (2020)
Keyphrases
- information security
- security vulnerabilities
- security issues
- security mechanisms
- attack scenarios
- security services
- denial of service
- trust management
- security risks
- security breaches
- intrusion detection
- trust relationships
- access control
- trusted computing
- trust model
- privacy concerns
- security requirements
- computer security
- buffer overflow
- countermeasures
- dos attacks
- trust evaluation
- network security
- security problems
- security threats
- security protocols
- information systems
- usage control
- trust negotiation
- public key infrastructure
- policy enforcement
- computer graphics
- smart card
- laser range
- range data
- security measures
- alert correlation
- statistical databases
- security patterns
- enterprise network
- resource constrained
- intrusion detection system
- data security
- security management