Abstract:
This paper presents a classification of attacks by malicious software. Unlike previous schemes, it focuses on application software instead of operating systems. We classi...View moreMetadata
Abstract:
This paper presents a classification of attacks by malicious software. Unlike previous schemes, it focuses on application software instead of operating systems. We classify attacks pertaining to input, processing, and output of an application. Our scheme can be used to adapt testing strategies and is intended as a step towards developing a security metric for assessing robustness of programs.
Date of Conference: 15-17 April 2004
Date Added to IEEE Xplore: 23 February 2005
Print ISBN:0-7803-8396-6