1994
DOI: 10.1145/185403.185412
|View full text |Cite
|
Sign up to set email alerts
|

A taxonomy of computer program security flaws

Abstract: An organized record of actual flaws can be useful to computer system designers, programmers, analysts, administrators, and users. This survey provides a taxonomy for computer program security flaws, with an Appendix that documents 50 actual security flaws. These flaws have all been described previously in the open literature, but in widely separated places. For those new to the field of computer security, they provide a good introduction to the characteristics of security flaws and how they can arise. Because … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
143
0
10

Year Published

1995
1995
2012
2012

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 333 publications
(159 citation statements)
references
References 11 publications
0
143
0
10
Order By: Relevance
“…Malicious logic faults, that encompass development faults (#5,#6) such as Trojan horses, logic or timing bombs, and trapdoors, as well as operational faults (#25) such as viruses, worms, or zombies. Definitions for these faults [Landwehr et al 1994, Powell & Stroud 2003] are given in figure 3.5.…”
Section: On Malicious Faultsmentioning
confidence: 99%
“…Malicious logic faults, that encompass development faults (#5,#6) such as Trojan horses, logic or timing bombs, and trapdoors, as well as operational faults (#25) such as viruses, worms, or zombies. Definitions for these faults [Landwehr et al 1994, Powell & Stroud 2003] are given in figure 3.5.…”
Section: On Malicious Faultsmentioning
confidence: 99%
“…This event will cause 2 hours of unavailability for R 01 . Taxonomy-based approaches, such as Computer Program Flaws [15], Faults [16], can be used to identify this class of events related to the software systems. For identifying events in other domains (e.g., management, financial), analysts should conduct the interviews to the related stakeholders or the domain experts.…”
Section: Modeling Processmentioning
confidence: 99%
“…A facility of this program is that it can log all terminal output into a user-specified file. Due to a serialisation error in the procedure for checking this write privilege [Landwehr et al 1994], the output can be diverted to any file in the file system.…”
Section: Examples Of Used Programs Are Crack Cops Tiger and Iss (Inmentioning
confidence: 99%