The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

Writing, Supporting, and Evaluating Tripwire: A Publically Available Security Tool

Gene H. Kim and E. H. Spafford
Download: PDF
Added 2002-07-26

Authorship Analysis: Identifying the Author of a Program

CSD-TR-96-052
Ivan Krsul and Eugene H. Spafford
Download: PDF
Added 2002-07-26


Computer Vulnerability Analysis

COAST TR 98-07
Ivan Krsul, E. H. Spafford and Mahesh V. Tripunitara
Download: PDF
Added 2002-07-26

COAST Vulnerability Database User's Manual

COAST TR 98-08
Ivan Krsul
Download: PDF
Added 2002-07-26

Software Vulnerability Analysis

COAST TR 98-09
Ivan Krsul
Download: PDF

The consequences of a class of system failures, commonly known as software vulnerabilities, violate security policies.  They can cause the loss of information and reduce the value or usefulness of the system. An increased understanding of the nature of vulnerabilities, their manifestations, and the mechanisms that can be used to eliminate and prevent them can be achieved by the development of a unified definition of software vulnerabilities, the development of a framework for the creation of taxonomies for vulnerabilites, and the application of learning, visualization, and statistical tools on a representative collection of software vulnerabilities. This dissertation provides a unifying definition of software vulnerability based on the notion that it is securty policies that define what is allowable or desirable in a system.  It also includes a framework for the development of classifications and taxonomies for software vulnerabilities. This dissertation presents a classification of software vulnerabilities that focuses n the assumptions that programmers make regarding the environment in which their application will be executed and that frequently do not hold during the execution of the program. This dissertation concludes by showing that the unifying definition of software vulnerability, the framweork for the development of classifications, and the application of learning and visulization tools can be used to improve security.

Added 2002-07-26

Report of the CMAD III - 3rd Annual Workshop on Computer Misuse and Anomaly Detection

COAST TR 95-01
Sandeep Kumar, Steven W. Lodin, and Christoph L. Schuba
Added 2002-07-26

A Generic Virus Scanner in C++

Sandeep Kumar and E. H. Spafford;
Download: PDF
Added 2002-07-26

An Application of Pattern Matching in Intrusion Detection

CSD-TR-94-013
Sandeep Kumar and E. H. Spafford
Download: PDF
Added 2002-07-26

A Pattern-Matching Model for Misuse Instrusion Detection

Sandeep Kumar and E. H. Spafford;
Download: PDF
Added 2002-07-26

A Software Architecture to Support Misuse Instrusion Detection

CSD-TR-95-009
Sandeep Kumar and E. H. Spafford
Download: PDF
Added 2002-07-26

Generation of Application Level Audit Data via Library Interposition

COAST TR 98-17
Benjamin A. Kuperman, E. H. Spafford
Download: PDF
Added 2002-07-26

Temporal Sequence Learning and Data Reduction for Anomaly Detection

COAST TR 98-18
Terran Lane, Carla E. Brodley
Download: PDF
Added 2002-07-26

Filtering Techniques for Rapid User Classification

COAST TR 98-13
Terran Lane, Carla E. Brodley
Download: PDF
Added 2002-07-26