Login / Signup

Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions.

Luca AllodiSandro Etalle
Published in: SafeConfig@CCS (2017)
Keyphrases
  • countermeasures
  • simplifying assumptions
  • real life
  • data corruption
  • information security
  • security vulnerabilities
  • buffer overflow
  • attack graphs
  • learning algorithm
  • security risks
  • attack graph