Attack surface

Results: 63



#Item
1NTRU Prime: reducing attack surface at low cost Daniel J. Bernstein1 , Chitchanok Chuengsatiansup2 , Tanja Lange3 , and Christine van Vredendaal3 1

NTRU Prime: reducing attack surface at low cost Daniel J. Bernstein1 , Chitchanok Chuengsatiansup2 , Tanja Lange3 , and Christine van Vredendaal3 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-08-17 12:09:19
    2WHITE PAPER LANDSCAPE OVERVIEW Mobile apps have become the digital touchpoint of choice, overtaking time spent in the web browser. This exposes a valuable new attack surface which is rapidly attracting the attentions of

    WHITE PAPER LANDSCAPE OVERVIEW Mobile apps have become the digital touchpoint of choice, overtaking time spent in the web browser. This exposes a valuable new attack surface which is rapidly attracting the attentions of

    Add to Reading List

    Source URL: www.approov.io

    Language: English - Date: 2018-07-18 07:07:09
      3Attack Surface Reduction for Web Services based on Authorization Patterns Roland Steinegger, Johannes Schäfer, Max Vogler, and Sebastian Abeck Research Group Cooperation & Management (C&M) Karlsruhe Institute of Technol

      Attack Surface Reduction for Web Services based on Authorization Patterns Roland Steinegger, Johannes Schäfer, Max Vogler, and Sebastian Abeck Research Group Cooperation & Management (C&M) Karlsruhe Institute of Technol

      Add to Reading List

      Source URL: cm.tm.kit.edu

      Language: English - Date: 2015-09-11 10:04:13
        4Understanding the Attack Surface and Attack Resilience of Project Spartan’s (Edge) New EdgeHTML Rendering Engine Mark Vincent Yason IBM X-Force Advanced Research

        Understanding the Attack Surface and Attack Resilience of Project Spartan’s (Edge) New EdgeHTML Rendering Engine Mark Vincent Yason IBM X-Force Advanced Research

        Add to Reading List

        Source URL: www.blackhat.com

        - Date: 2015-09-01 14:45:07
          5SESSION ID:  ASD-T10 Securing the Internet of Things: Mapping Attack Surface Areas

          SESSION ID: ASD-T10 Securing the Internet of Things: Mapping Attack Surface Areas

          Add to Reading List

          Source URL: www.owasp.org

          - Date: 2015-08-17 12:19:01
            6LPCUsing seccomp to limit the kernel attack surface c 2015 Michael Kerrisk, man7.org

            LPCUsing seccomp to limit the kernel attack surface c 2015 Michael Kerrisk, man7.org

            Add to Reading List

            Source URL: man7.org

            - Date: 2016-12-14 16:13:11
              7SOLUTION BRIEF  The Perimeter Isn’t Perfect: Reduce Your Attack Surface & Automate Server Protection Automated, continuous security right at the workload, where it counts. THE WORKLOAD SECURITY CHALLENGE

              SOLUTION BRIEF The Perimeter Isn’t Perfect: Reduce Your Attack Surface & Automate Server Protection Automated, continuous security right at the workload, where it counts. THE WORKLOAD SECURITY CHALLENGE

              Add to Reading List

              Source URL: 2hvcbhl545p46lgtq2nhxci9-wpengine.netdna-ssl.com

              - Date: 2016-05-25 17:44:44
                8Backgrounder Boeing Defense, Space & Security P.O. Box 516 St. Louis, MOwww.boeing.com

                Backgrounder Boeing Defense, Space & Security P.O. Box 516 St. Louis, MOwww.boeing.com

                Add to Reading List

                Source URL: www.boeing.co.kr

                Language: English - Date: 2015-10-14 18:42:51
                9Backgrounder Boeing Defense, Space & Security P.O. Box 516 St. Louis, MOwww.boeing.com

                Backgrounder Boeing Defense, Space & Security P.O. Box 516 St. Louis, MOwww.boeing.com

                Add to Reading List

                Source URL: www.boeing.co.kr

                Language: English - Date: 2015-10-16 09:28:39