Back to Results
First PageMeta Content
Computing / Computer network security / Hacking / MaraDNS / Denial-of-service attack / Server / Fault injection / Memory leak / Vulnerability / Software testing / Cyberwarfare / Computer security


Detection and Prediction of Resource-Exhaustion Vulnerabilities ∗ João Antunes Nuno Ferreira Neves Paulo Verissimo
Add to Reading List

Document Date: 2008-08-29 11:22:00


Open Document

File Size: 347,68 KB

Share Result on Facebook

City

London / /

Company

C. Wueest / PREDicting ATtacks On Resources / Symantec / Intel / Internet Systems Consortium Inc. / DNS / NLnet Labs / /

Currency

pence / /

Event

Product Issues / FDA Phase / /

Facility

University of Oulu / PAPI library / PTRACE facility / LibGTop library / João Antunes Nuno Ferreira Neves Paulo Verissimo University of Lisboa / /

IndustryTerm

black box testing tool / fault-tolerant computing systems / synthetic server / intensive server / Internet domain names / echo server / software bug / client/server / ordinary fault injection tools / communication protocol / software modules / Internet Name Domain / attack generation algorithms / test case generation algorithm / fault injection tool / software aging / portable solutions / internet security threat report / software systems / software faults / non-Internet class records / poor resource management / thread leak server / target server / file processing vulnerabilities / query/response stateless protocol / attack creation algorithm / generation algorithms / target communication protocol / software rejuvenation / target network server / post-processing analysis / target systems / tested software components / given target server / disk leak server / /

OperatingSystem

UNIX / Linux / Ubuntu / DoS / POSIX / /

Organization

Faculty of Sciences / Department of Defense / João Antunes Nuno Ferreira Neves Paulo Verissimo University of Lisboa / University of Oulu / /

Position

driver / performance-monitoring counters driver / comprehensive model for software rejuvenation / model for the first server / Test Manager / Manager P2 / Execution data Collector / representative / Target Protocol Specification Attack Generator GUI Protocol Specification Test Manager / memory manager / /

Product

attack / drivers / /

ProgrammingLanguage

EC / php / /

ProvinceOrState

N. F. / /

PublishedMedium

Linux Magazine / Communications of the ACM / /

Technology

specific attack creation algorithm / UNIX / Linux / query/response stateless protocol / operating system / html / operating systems / 3 Target Protocol Specification Attack Generator GUI Protocol / DNS protocol / network protocol / Fluctuating processors / same application protocol / communication protocol / attack generation algorithms / client/server / target communication protocol / GUI Protocol / generation algorithms / test case generation algorithm / GUI / /

URL

http /

SocialTag