Login / Signup
Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions.
Luca Allodi
Sandro Etalle
Published in:
SafeConfig@CCS (2017)
Keyphrases
</>
countermeasures
simplifying assumptions
real life
data corruption
information security
security vulnerabilities
buffer overflow
attack graphs
learning algorithm
security risks
attack graph