datasheets.com EBN.com EDN.com EETimes.com Embedded.com PlanetAnalog.com TechOnline.com  
Events
UBM Tech
UBM Tech
Welcome Guest Log In | Register

Protocol Vulnerability Patterns: Why Do the Same Bad Things Keep Happening to Good Programmers?

Authored on: Apr 28, 2008

Technical Paper

0 0
More InfoLess Info

Many seemingly disparate protocols perform similar types of operations. The skilled hacker can take inspiration from the fact that a feature within a particular protocol is vulnerable to a given kind of attack, and make an educated guess that an attack on a similar feature within a completely unrelated protocol might have a good chance of success.

This paper discusses the Mu-4000 Security Analyzer, which has a mutation engine designed to find these flaws regardless of setting. The Mu-4000 sees all the familiar features in different protocols as different instances of the same underlying feature and attacks them similarly.

View
 
0 comments
write a comment

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page