Back to Results
First PageMeta Content
Computing / Software bugs / Hacking / Data security / Denial-of-service attack / Buffer overflow protection / Vulnerability / Firewall / Transmission Control Protocol / Computer network security / Computer security / Cyberwarfare


The Cracker Patch Choice: An Analysis of Post Hoc Security Techniques1 Crispin Cowan, Heather Hinton, Calton Pu, and Jonathan Walpole [removed], http://immunix.org/ WireX Communications, Inc.2 Abstract
Add to Reading List

Document Date: 2000-11-03 00:00:00


Open Document

File Size: 62,90 KB

Share Result on Facebook

Company

WireX Communications Inc. / Nee Platinum Nee Computer Associates / org/ WireX Communications Inc. / /

/

Facility

Cracker Patch Choice / Georgia Institute of Technology / Ryerson Polytechnic University / Oregon Graduate Institute / /

IndustryTerm

secret algorithm / software failures / capability systems / authentication protocol / secure systems / actual server / tagged memory systems / legitimate applications / software security bug / encryption protocol / vulnerable host systems / construction secure systems / tested operating systems / web servers / cryptographic protocols / computer systems / secure solution / diverse operating systems / mail server / application software / vulnerable software / modified client software / fake mail server / web server / search space / above systems / encryption algorithm / similar product / /

OperatingSystem

UNIX / AS/400 / Linux / AIX / FreeBSD / Solaris / Microsoft Windows / POSIX / /

Organization

Ryerson Polytechnic University / Oregon Graduate Institute / Georgia Institute of Technology / /

Person

Jonathan Walpole / Crispin Cowan / Calton Pu / Heather Hinton / /

Position

application programmer / /

ProgrammingLanguage

Java / Java bytecode / C / Hoc / /

Technology

1.6 Encryption Encryption / virtual machine / TCP protocol / authentication protocol / LAN / encryption algorithm / UNIX / Linux / operating system / Quality of Service / SSL / operating systems / TCP/IP / encryption / cryptography / session encryption / flow control / Java / firewall / secret algorithm / encryption protocol / web server / /

URL

http /

SocialTag